EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 22:43:46.758 03/01/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 22:43:46.918 03/01/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 22:43:46.918 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 22:43:47.018 03/01/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1106 for TCP connection. 5 22:43:47.018 03/01/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 22:43:47.018 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 22:43:47.018 03/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1106, dst port 4005 8 22:43:47.669 03/01/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1106 9 22:43:47.669 03/01/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1106, dst port 4005 10 22:43:47.669 03/01/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 22:43:48.170 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 22:43:48.200 03/01/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 22:43:48.220 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 22:43:48.390 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 22:43:48.390 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 22:43:48.390 03/01/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 22:43:48.390 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 22:43:48.390 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 22:43:48.390 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 22:43:48.400 03/01/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 22:43:48.400 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 22:43:48.400 03/01/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 22:43:48.400 03/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 22:43:48.430 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 22:43:48.430 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 22:43:48.430 03/01/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 22:43:48.430 03/01/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=0B025F4EC47BC25A R_Cookie=B1753F4FAD6495AB) reason = DEL_REASON_LOAD_BALANCING 28 22:43:48.430 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 22:43:49.171 03/01/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=0B025F4EC47BC25A R_Cookie=B1753F4FAD6495AB) reason = DEL_REASON_LOAD_BALANCING 30 22:43:49.171 03/01/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 22:43:49.171 03/01/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 22:43:49.171 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 22:43:49.181 03/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 22:43:49.672 03/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1106, dst port 4005 35 22:43:49.672 03/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1106, dst port 4005 36 22:43:49.672 03/01/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1106 37 22:43:49.672 03/01/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1106, dst port 4005 38 22:43:49.672 03/01/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 22:43:50.172 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 22:43:50.192 03/01/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 22:43:50.213 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 22:43:50.383 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 22:43:50.383 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 22:43:50.383 03/01/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 22:43:50.383 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 22:43:50.383 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 22:43:50.383 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 22:43:50.393 03/01/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 22:43:50.393 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 22:43:50.393 03/01/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 22:43:50.393 03/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 22:43:50.413 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 22:43:50.413 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 22:43:50.413 03/01/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 22:44:06.216 03/01/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 22:44:06.216 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 22:44:08.339 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 22:44:08.339 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 22:44:08.339 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 22:44:08.339 03/01/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F7A64AE17A79A28E R_Cookie=C01CCEBAA4F78A63) reason = DEL_REASON_WE_FAILED_AUTH 61 22:44:08.339 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 62 22:44:08.399 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 63 22:44:08.399 03/01/07 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=F7A64AE17A79A28E R_Cookie=C01CCEBAA4F78A63 64 22:44:08.399 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 137.69.115.16 65 22:44:08.709 03/01/07 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 137.69.115.16, src port 4005, dst port 1106 66 22:44:09.200 03/01/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F7A64AE17A79A28E R_Cookie=C01CCEBAA4F78A63) reason = DEL_REASON_WE_FAILED_AUTH 67 22:44:09.200 03/01/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "137.69.115.16" because of "DEL_REASON_WE_FAILED_AUTH" 68 22:44:09.200 03/01/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 69 22:44:09.200 03/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 70 22:44:09.200 03/01/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1106 for TCP connection. 71 22:44:09.200 03/01/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 72 22:44:09.240 03/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1106, dst port 4005 73 22:44:09.240 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 74 22:44:09.240 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 75 22:44:09.240 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 22:44:09.240 03/01/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 77 22:44:15.429 03/01/07 Sev=Info/4 CM/0x63100002 Begin connection process 78 22:44:15.459 03/01/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 79 22:44:15.459 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 80 22:44:15.469 03/01/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1115 for TCP connection. 81 22:44:15.709 03/01/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 82 22:44:15.709 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 83 22:44:15.709 03/01/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 84 22:44:15.709 03/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1115, dst port 4005 85 22:44:15.709 03/01/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1115 86 22:44:15.709 03/01/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1115, dst port 4005 87 22:44:15.709 03/01/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 88 22:44:16.220 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 89 22:44:16.230 03/01/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 90 22:44:16.250 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 91 22:44:16.420 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 92 22:44:16.420 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 93 22:44:16.420 03/01/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 94 22:44:16.420 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 95 22:44:16.420 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 96 22:44:16.420 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 97 22:44:16.430 03/01/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 98 22:44:16.430 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 99 22:44:16.430 03/01/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 100 22:44:16.430 03/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 101 22:44:16.460 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 102 22:44:16.460 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 103 22:44:16.460 03/01/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 104 22:44:16.460 03/01/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=46D079D216EE1305 R_Cookie=F36B92A602517C4A) reason = DEL_REASON_LOAD_BALANCING 105 22:44:16.460 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 106 22:44:17.211 03/01/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=46D079D216EE1305 R_Cookie=F36B92A602517C4A) reason = DEL_REASON_LOAD_BALANCING 107 22:44:17.211 03/01/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 108 22:44:17.211 03/01/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 109 22:44:17.211 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 110 22:44:17.221 03/01/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 111 22:44:17.712 03/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1115, dst port 4005 112 22:44:17.712 03/01/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1115, dst port 4005 113 22:44:17.722 03/01/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1115 114 22:44:17.722 03/01/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1115, dst port 4005 115 22:44:17.722 03/01/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 116 22:44:18.213 03/01/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 117 22:44:18.233 03/01/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 118 22:44:18.253 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 119 22:44:18.423 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 120 22:44:18.423 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 121 22:44:18.423 03/01/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 122 22:44:18.423 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 123 22:44:18.423 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 124 22:44:18.423 03/01/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 125 22:44:18.433 03/01/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 126 22:44:18.433 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 127 22:44:18.433 03/01/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 128 22:44:18.433 03/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 129 22:44:48.466 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 130 22:44:48.466 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 131 22:44:48.466 03/01/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 132 22:45:02.977 03/01/07 Sev=Info/4 CM/0x63100017 xAuth application returned 133 22:45:02.977 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 134 22:45:05.431 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 135 22:45:05.431 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 136 22:45:05.431 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 137 22:45:05.431 03/01/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 138 22:45:05.511 03/01/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 139 22:45:05.511 03/01/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 140 22:45:05.521 03/01/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 141 22:45:05.521 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 142 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 143 22:45:06.472 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 144 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.51 145 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 146 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 147 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 148 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 149 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 150 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 151 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 152 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 153 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 154 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 155 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 156 22:45:06.472 03/01/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 157 22:45:06.482 03/01/07 Sev=Info/4 CM/0x63100019 Mode Config data received 158 22:45:06.502 03/01/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.51, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 159 22:45:06.502 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 160 22:45:06.502 03/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 161 22:45:06.502 03/01/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 162 22:45:06.532 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 163 22:45:06.532 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 164 22:45:06.542 03/01/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 165 22:45:06.542 03/01/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 48 seconds, setting expiry to 86352 seconds from now 166 22:45:06.542 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 22:45:06.542 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 168 22:45:06.542 03/01/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 169 22:45:06.542 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 170 22:45:06.542 03/01/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=66B06561 OUTBOUND SPI = 0x702ADAFE INBOUND SPI = 0xFD7463FB) 171 22:45:06.542 03/01/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x702ADAFE 172 22:45:06.542 03/01/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xFD7463FB 173 22:45:09.527 03/01/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.51/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 174 22:45:09.577 03/01/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 175 22:45:09.787 03/01/07 Sev=Info/4 CM/0x6310001A One secure connection established 176 22:45:09.907 03/01/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.101. Current address(es): 192.168.1.101, 10.13.8.51, 192.168.6.1, 192.168.5.1. 177 22:45:09.907 03/01/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.51. Current address(es): 192.168.1.101, 10.13.8.51, 192.168.6.1, 192.168.5.1. 178 22:45:10.167 03/01/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 179 22:45:10.167 03/01/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xfeda2a70 into key list 180 22:45:10.167 03/01/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 181 22:45:10.167 03/01/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xfb6374fd into key list 182 22:45:10.167 03/01/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.51 183 22:45:10.788 03/01/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xfeda2a70 for inbound key with SPI=0xfb6374fd 184 22:46:46.473 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126508 185 22:46:46.473 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 186 22:46:46.503 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 187 22:46:46.503 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 188 22:46:46.503 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126509, seq# expected = 2700126509 189 22:49:18.780 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 190 22:52:48.119 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126509 191 22:52:48.119 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 192 22:52:48.150 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 193 22:52:48.150 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 194 22:52:48.150 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126510, seq# expected = 2700126510 195 22:54:18.750 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 196 22:59:19.703 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 197 23:04:20.145 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 198 23:09:20.599 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 199 23:14:21.049 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 200 23:17:56.872 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126510 201 23:17:56.872 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 202 23:17:56.942 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 203 23:17:56.942 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 204 23:17:56.942 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126511, seq# expected = 2700126511 205 23:19:20.998 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 206 23:24:21.334 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 207 23:25:02.900 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126511 208 23:25:02.900 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 209 23:25:02.930 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 210 23:25:02.930 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 211 23:25:02.930 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126512, seq# expected = 2700126512 212 23:29:21.752 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 213 23:31:20.413 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126512 214 23:31:20.413 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 215 23:31:20.443 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 216 23:31:20.443 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 217 23:31:20.443 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126513, seq# expected = 2700126513 218 23:34:22.170 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 219 23:38:48.557 03/01/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126513 220 23:38:48.557 03/01/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 221 23:38:48.587 03/01/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 222 23:38:48.587 03/01/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 223 23:38:48.587 03/01/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126514, seq# expected = 2700126514 224 23:39:22.623 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 225 23:44:23.099 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 226 23:49:24.557 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 227 23:54:24.987 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 228 23:59:24.939 03/01/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 229 00:02:26.200 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126514 230 00:02:26.200 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 231 00:02:26.230 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 232 00:02:26.230 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 233 00:02:26.230 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126515, seq# expected = 2700126515 234 00:02:36.715 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126515 235 00:02:36.715 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 236 00:02:36.745 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 237 00:02:36.755 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 238 00:02:36.755 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126516, seq# expected = 2700126516 239 00:02:57.745 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126516 240 00:02:57.745 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 241 00:02:57.775 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 242 00:02:57.775 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 243 00:02:57.775 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126517, seq# expected = 2700126517 244 00:04:24.870 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 245 00:09:25.803 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 246 00:14:26.245 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 247 00:19:26.727 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 248 00:24:26.668 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 249 00:29:27.739 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 250 00:32:59.419 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126517 251 00:32:59.419 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 252 00:32:59.449 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 253 00:32:59.449 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 254 00:32:59.449 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126518, seq# expected = 2700126518 255 00:34:27.546 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 256 00:39:28.479 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 257 00:44:28.961 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 258 00:49:29.387 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 259 00:54:30.360 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 260 00:55:08.414 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126518 261 00:55:08.414 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 262 00:55:08.444 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 263 00:55:08.444 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 264 00:55:08.444 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126519, seq# expected = 2700126519 265 00:59:30.291 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 266 01:02:58.600 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126519 267 01:02:58.600 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 268 01:02:58.630 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 269 01:02:58.630 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 270 01:02:58.630 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126520, seq# expected = 2700126520 271 01:04:30.231 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 272 01:08:24.566 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126520 273 01:08:24.566 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 274 01:08:24.596 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 275 01:08:24.596 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 276 01:08:24.596 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126521, seq# expected = 2700126521 277 01:09:30.661 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 278 01:14:31.103 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 279 01:17:56.909 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126521 280 01:17:56.909 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 281 01:17:56.929 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 282 01:17:56.929 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 283 01:17:56.929 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126522, seq# expected = 2700126522 284 01:19:31.546 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 285 01:24:32.184 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 286 01:29:33.116 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 287 01:34:32.557 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 288 01:39:32.970 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 289 01:44:33.407 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 290 01:49:34.326 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 291 01:54:34.755 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 292 01:59:35.685 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 293 02:02:56.983 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126522 294 02:02:56.983 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 295 02:02:57.003 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 296 02:02:57.013 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 297 02:02:57.013 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126523, seq# expected = 2700126523 298 02:04:35.113 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 299 02:07:34.369 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126523 300 02:07:34.369 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 301 02:07:34.399 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 302 02:07:34.399 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 303 02:07:34.399 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126524, seq# expected = 2700126524 304 02:09:36.042 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 305 02:14:36.493 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 306 02:17:59.789 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126524 307 02:17:59.789 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 308 02:17:59.809 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 309 02:17:59.809 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 310 02:17:59.819 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126525, seq# expected = 2700126525 311 02:19:36.429 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 312 02:24:37.866 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 313 02:29:37.800 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 314 02:32:59.091 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126525 315 02:32:59.091 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 316 02:32:59.121 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 317 02:32:59.121 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 318 02:32:59.121 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126526, seq# expected = 2700126526 319 02:33:54.672 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126526 320 02:33:54.672 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 321 02:33:54.692 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 322 02:33:54.692 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 323 02:33:54.692 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126527, seq# expected = 2700126527 324 02:34:38.235 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 325 02:39:38.169 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 326 02:44:39.102 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 327 02:49:39.516 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 328 02:54:39.968 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 329 02:59:39.899 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 330 03:04:40.852 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 331 03:06:17.481 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126527 332 03:06:17.481 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 333 03:06:17.501 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 334 03:06:17.501 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 335 03:06:17.501 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126528, seq# expected = 2700126528 336 03:09:41.274 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 337 03:14:41.706 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 338 03:19:41.640 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 339 03:24:42.064 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 340 03:29:42.994 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 341 03:32:57.772 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126528 342 03:32:57.772 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 343 03:32:57.792 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 344 03:32:57.792 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 345 03:32:57.792 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126529, seq# expected = 2700126529 346 03:34:42.932 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 347 03:39:43.351 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 348 03:44:44.281 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 349 03:49:44.710 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 350 03:54:44.664 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 351 03:59:45.609 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 352 04:04:46.054 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 353 04:07:03.744 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126529 354 04:07:03.744 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 355 04:07:03.774 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 356 04:07:03.774 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 357 04:07:03.774 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126530, seq# expected = 2700126530 358 04:09:00.413 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126530 359 04:09:00.413 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 360 04:09:00.443 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 361 04:09:00.443 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 362 04:09:00.443 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126531, seq# expected = 2700126531 363 04:09:46.479 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 364 04:14:47.415 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 365 04:19:46.859 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 366 04:24:47.784 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 367 04:29:48.724 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 368 04:34:05.586 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126531 369 04:34:05.586 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 370 04:34:05.606 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 371 04:34:05.606 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 372 04:34:05.606 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126532, seq# expected = 2700126532 373 04:34:48.138 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 374 04:39:49.070 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126532 375 04:39:49.070 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 376 04:39:49.070 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 377 04:39:49.100 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 378 04:39:49.100 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 379 04:39:49.100 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126533, seq# expected = 2700126533 380 04:44:49.502 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 381 04:49:49.934 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 382 04:54:50.366 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 383 04:59:50.798 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 384 05:02:57.066 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126533 385 05:02:57.066 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 386 05:02:57.096 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 387 05:02:57.096 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 388 05:02:57.096 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126534, seq# expected = 2700126534 389 05:04:50.730 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 390 05:09:07.599 03/02/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xfeda2a70 is about to expire, requesting a new one 391 05:09:07.599 03/02/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.51, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 392 05:09:07.599 03/02/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=04C5A5CF) Initiator = ID=10.13.8.51 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 393 05:09:07.599 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 394 05:09:07.629 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 05:09:07.629 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 396 05:09:07.629 03/02/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 397 05:09:07.629 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 398 05:09:07.629 03/02/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=04C5A5CF OUTBOUND SPI = 0x27A1E47D INBOUND SPI = 0x395CCFF0) 399 05:09:07.629 03/02/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x27A1E47D 400 05:09:07.629 03/02/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x395CCFF0 401 05:09:07.629 03/02/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 402 05:09:08.120 03/02/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 403 05:09:08.120 03/02/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7de4a127 into key list 404 05:09:08.120 03/02/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 405 05:09:08.120 03/02/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf0cf5c39 into key list 406 05:09:37.622 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 407 05:09:37.622 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 408 05:09:37.622 03/02/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 702ADAFE INBOUND SPI = FD7463FB) 409 05:09:37.622 03/02/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=66B06561 410 05:09:37.622 03/02/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xfb6374fd 411 05:09:37.622 03/02/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xfb6374fd 412 05:09:37.622 03/02/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xfeda2a70 413 05:09:37.632 03/02/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xfeda2a70 414 05:09:51.172 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 415 05:09:52.163 03/02/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x7de4a127 for inbound key with SPI=0xf0cf5c39 416 05:13:51.507 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126534 417 05:13:51.507 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 418 05:13:51.537 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 419 05:13:51.537 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 420 05:13:51.537 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126535, seq# expected = 2700126535 421 05:14:51.604 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 422 05:17:59.864 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126535 423 05:17:59.864 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 424 05:17:59.894 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 425 05:17:59.894 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 426 05:17:59.894 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126536, seq# expected = 2700126536 427 05:19:52.026 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 428 05:24:52.968 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 429 05:29:53.400 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 430 05:33:37.222 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126536 431 05:33:37.222 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 432 05:33:37.252 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 433 05:33:37.252 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 434 05:33:37.252 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126537, seq# expected = 2700126537 435 05:34:53.832 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 436 05:39:53.755 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 437 05:44:54.687 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 438 05:45:36.247 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126537 439 05:45:36.247 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 440 05:45:36.277 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 441 05:45:36.277 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 442 05:45:36.277 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126538, seq# expected = 2700126538 443 05:47:57.450 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126538 444 05:47:57.450 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 445 05:47:57.480 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 446 05:47:57.480 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 447 05:47:57.480 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126539, seq# expected = 2700126539 448 05:49:54.639 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 449 05:54:55.061 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 450 05:59:56.003 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 451 06:01:15.117 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126539 452 06:01:15.117 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 453 06:01:15.137 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 454 06:01:15.137 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 455 06:01:15.137 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126540, seq# expected = 2700126540 456 06:04:56.445 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 457 06:08:53.286 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126540 458 06:08:53.286 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 459 06:08:53.316 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 460 06:08:53.316 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 461 06:08:53.316 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126541, seq# expected = 2700126541 462 06:09:04.302 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126541 463 06:09:04.302 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 464 06:09:04.322 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 465 06:09:04.322 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 466 06:09:04.322 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126542, seq# expected = 2700126542 467 06:09:35.346 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126542 468 06:09:35.346 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 469 06:09:35.377 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 470 06:09:35.377 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 471 06:09:35.377 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126543, seq# expected = 2700126543 472 06:09:56.877 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 473 06:14:56.809 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 474 06:18:00.082 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126543 475 06:18:00.082 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 476 06:18:00.112 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 477 06:18:00.112 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 478 06:18:00.112 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126544, seq# expected = 2700126544 479 06:19:57.251 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 480 06:21:36.894 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126544 481 06:21:36.894 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 482 06:21:36.924 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 483 06:21:36.924 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 484 06:21:36.924 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126545, seq# expected = 2700126545 485 06:24:58.193 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 486 06:29:58.135 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 487 06:32:57.393 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126545 488 06:32:57.393 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 489 06:32:57.423 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 490 06:32:57.423 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 491 06:32:57.423 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126546, seq# expected = 2700126546 492 06:34:18.509 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126546 493 06:34:18.509 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 494 06:34:18.539 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 495 06:34:18.539 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 496 06:34:18.539 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126547, seq# expected = 2700126547 497 06:34:58.567 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 498 06:40:00.000 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 499 06:40:05.007 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126547 500 06:40:05.007 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 501 06:40:05.027 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 502 06:40:05.027 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 503 06:40:05.027 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126548, seq# expected = 2700126548 504 06:44:59.931 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 505 06:45:37.495 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126548 506 06:45:37.495 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 507 06:45:37.516 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 508 06:45:37.516 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 509 06:45:37.516 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126549, seq# expected = 2700126549 510 06:46:23.552 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126549 511 06:46:23.552 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 512 06:46:23.582 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 513 06:46:23.582 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 514 06:46:23.582 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126550, seq# expected = 2700126550 515 06:50:00.383 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 516 06:55:00.325 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 517 07:00:01.258 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 518 07:05:01.700 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 519 07:10:02.132 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 520 07:13:31.432 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126550 521 07:13:31.432 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 522 07:13:31.463 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 523 07:13:31.463 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 524 07:13:31.463 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126551, seq# expected = 2700126551 525 07:15:02.063 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 526 07:18:00.319 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126551 527 07:18:00.319 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 528 07:18:00.349 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 529 07:18:00.349 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 530 07:18:00.349 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126552, seq# expected = 2700126552 531 07:20:02.495 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 532 07:25:03.428 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 533 07:30:03.870 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 534 07:32:57.960 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126552 535 07:32:57.960 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 536 07:32:57.990 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 537 07:32:57.990 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 538 07:32:57.990 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126553, seq# expected = 2700126553 539 07:33:33.511 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126553 540 07:33:33.511 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 541 07:33:33.541 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 542 07:33:33.541 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 543 07:33:33.541 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126554, seq# expected = 2700126554 544 07:34:29.602 03/02/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2700126554 545 07:34:29.602 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 546 07:34:29.622 03/02/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 547 07:34:29.622 03/02/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 548 07:34:29.622 03/02/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2700126555, seq# expected = 2700126555 549 07:35:03.641 03/02/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1115, dst port 4005 550 07:37:07.068 03/02/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 551 07:37:07.068 03/02/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 552 07:37:07.068 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 553 07:37:07.068 03/02/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 27A1E47D INBOUND SPI = 395CCFF0) 554 07:37:07.068 03/02/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=04C5A5CF 555 07:37:07.068 03/02/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=67050C0466B7256A R_Cookie=8F8B25021244120C) reason = DEL_REASON_RESET_SADB 556 07:37:07.068 03/02/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 557 07:37:07.068 03/02/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=67050C0466B7256A R_Cookie=8F8B25021244120C) reason = DEL_REASON_RESET_SADB 558 07:37:07.068 03/02/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 559 07:37:07.068 03/02/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 560 07:37:07.088 03/02/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 561 07:37:07.088 03/02/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1115 for TCP connection. 562 07:37:07.088 03/02/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 8:51:58 563 07:37:07.098 03/02/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 564 07:37:08.850 03/02/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 565 07:37:08.870 03/02/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 566 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf0cf5c39 567 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf0cf5c39 568 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7de4a127 569 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7de4a127 570 07:37:08.930 03/02/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1115, dst port 4005 571 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 572 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 573 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 574 07:37:08.930 03/02/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys