EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 12:13:57.362 03/04/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 12:13:57.543 03/04/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 12:13:57.543 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 12:13:57.643 03/04/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1975 for TCP connection. 5 12:13:57.653 03/04/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 12:13:57.653 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 12:13:57.653 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1975, dst port 4005 8 12:13:58.254 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1975 9 12:13:58.254 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1975, dst port 4005 10 12:13:58.254 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 12:13:58.754 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 12:13:58.774 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 12:13:58.804 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 12:13:58.975 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 12:13:58.985 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 12:13:58.985 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 12:13:58.985 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 12:13:58.985 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 12:13:58.985 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 12:13:58.985 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 12:13:58.985 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 12:13:58.985 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 12:13:58.985 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 12:13:59.015 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 12:13:59.015 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 12:13:59.015 03/04/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 12:13:59.015 03/04/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=7A034FA36F8A716C R_Cookie=AD347E93FF0A9905) reason = DEL_REASON_LOAD_BALANCING 28 12:13:59.015 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 12:13:59.756 03/04/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=7A034FA36F8A716C R_Cookie=AD347E93FF0A9905) reason = DEL_REASON_LOAD_BALANCING 30 12:13:59.756 03/04/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 12:13:59.756 03/04/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 12:13:59.766 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 12:13:59.776 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 12:14:00.257 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1975, dst port 4005 35 12:14:00.257 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1975, dst port 4005 36 12:14:00.257 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1975 37 12:14:00.257 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1975, dst port 4005 38 12:14:00.257 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 12:14:00.757 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 12:14:00.777 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 12:14:00.807 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 12:14:00.968 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 12:14:00.968 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 12:14:00.968 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 12:14:00.968 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 12:14:00.968 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 12:14:00.968 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 12:14:00.978 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 12:14:00.978 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 12:14:00.978 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 12:14:00.978 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 12:14:00.998 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 12:14:00.998 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 12:14:00.998 03/04/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 12:14:07.777 03/04/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 12:14:07.777 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 12:14:10.461 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 12:14:10.461 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 12:14:10.461 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 12:14:10.471 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 12:14:10.541 03/04/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 12:14:10.541 03/04/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 12:14:10.541 03/04/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 12:14:10.541 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 12:14:11.473 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.22 68 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 12:14:11.473 03/04/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 12:14:11.473 03/04/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 12:14:11.493 03/04/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.22, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 12:14:11.493 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 12:14:11.493 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 12:14:11.493 03/04/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 12:14:11.533 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 12:14:11.533 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 12:14:11.533 03/04/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 12:14:11.533 03/04/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 11 seconds, setting expiry to 86389 seconds from now 89 12:14:11.533 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 12:14:11.543 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 12:14:11.543 03/04/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 12:14:11.543 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 12:14:11.543 03/04/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=B195F672 OUTBOUND SPI = 0x401F8176 INBOUND SPI = 0xF2F2896C) 94 12:14:11.543 03/04/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x401F8176 95 12:14:11.543 03/04/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xF2F2896C 96 12:14:14.207 03/04/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.22/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 12:14:14.277 03/04/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 12:14:14.307 03/04/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 12:14:14.367 03/04/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.101. Current address(es): 192.168.1.101, 10.13.8.22, 192.168.6.1, 192.168.5.1. 100 12:14:14.367 03/04/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.22. Current address(es): 192.168.1.101, 10.13.8.22, 192.168.6.1, 192.168.5.1. 101 12:14:14.667 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 12:14:14.667 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x76811f40 into key list 103 12:14:14.667 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 12:14:14.667 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x6c89f2f2 into key list 105 12:14:14.667 03/04/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.22 106 12:14:17.782 03/04/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x76811f40 for inbound key with SPI=0x6c89f2f2 107 12:15:26.031 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547325 108 12:15:26.031 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 12:15:26.060 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 12:15:26.060 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 12:15:26.060 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547326, seq# expected = 2287547326 112 12:15:53.399 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547326 113 12:15:53.399 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 114 12:15:53.429 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 12:15:53.429 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 12:15:53.429 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547327, seq# expected = 2287547327 117 12:19:01.503 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 118 12:19:04.987 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547327 119 12:19:04.987 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 120 12:19:05.007 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 121 12:19:05.007 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 122 12:19:05.007 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547328, seq# expected = 2287547328 123 12:22:49.682 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547328 124 12:22:49.682 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 125 12:22:49.702 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 126 12:22:49.702 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 127 12:22:49.702 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547329, seq# expected = 2287547329 128 12:24:01.294 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 129 12:26:16.499 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547329 130 12:26:16.499 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 131 12:26:16.529 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 132 12:26:16.529 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 133 12:26:16.529 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547330, seq# expected = 2287547330 134 12:26:47.043 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547330 135 12:26:47.043 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 136 12:26:47.073 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 137 12:26:47.073 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 138 12:26:47.073 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547331, seq# expected = 2287547331 139 12:29:02.247 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 140 12:34:03.137 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 141 12:38:45.487 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547331 142 12:38:45.487 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 12:38:45.527 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 144 12:38:45.527 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 145 12:38:45.527 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547332, seq# expected = 2287547332 146 12:39:02.519 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 147 12:44:02.893 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 148 12:46:51.108 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547332 149 12:46:51.108 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 150 12:46:51.138 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 151 12:46:51.138 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 152 12:46:51.138 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547333, seq# expected = 2287547333 153 12:48:52.268 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547333 154 12:48:52.268 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 155 12:48:52.338 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 156 12:48:52.338 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 157 12:48:52.338 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547334, seq# expected = 2287547334 158 12:49:03.290 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 159 12:54:04.406 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 160 12:59:04.359 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 161 13:04:04.813 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 162 13:09:05.292 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 163 13:14:06.270 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 164 13:16:52.089 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547334 165 13:16:52.089 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 166 13:16:52.119 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 13:16:52.119 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 168 13:16:52.119 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547335, seq# expected = 2287547335 169 13:19:06.282 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 170 13:24:06.715 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 171 13:29:07.162 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 172 13:31:14.345 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547335 173 13:31:14.345 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 174 13:31:14.385 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 175 13:31:14.385 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 176 13:31:14.385 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547336, seq# expected = 2287547336 177 13:31:54.903 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547336 178 13:31:54.903 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 179 13:31:54.923 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 180 13:31:54.923 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 181 13:31:54.923 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547337, seq# expected = 2287547337 182 13:34:07.594 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 183 13:39:08.026 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 184 13:43:13.871 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547337 185 13:43:13.871 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 186 13:43:13.901 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 187 13:43:13.901 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 188 13:43:13.901 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547338, seq# expected = 2287547338 189 13:44:07.957 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 190 13:44:20.464 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547338 191 13:44:20.464 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 192 13:44:20.484 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 193 13:44:20.484 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 194 13:44:20.484 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547339, seq# expected = 2287547339 195 13:46:53.683 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547339 196 13:46:53.683 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 197 13:46:58.690 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547340 198 13:46:58.690 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 199 13:46:58.721 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 200 13:46:58.721 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 201 13:46:58.721 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547341, seq# expected = 2287547341 202 13:49:08.878 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 203 13:54:08.809 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 204 13:55:14.403 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547341 205 13:55:14.403 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 13:55:14.433 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 13:55:14.433 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 13:55:14.433 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547342, seq# expected = 2287547342 209 13:59:09.245 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 210 14:01:53.996 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547342 211 14:01:53.996 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 212 14:01:54.026 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 213 14:01:54.026 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 214 14:01:54.026 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547343, seq# expected = 2287547343 215 14:04:10.712 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 216 14:07:13.575 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547343 217 14:07:13.575 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 14:07:13.595 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 14:07:13.595 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 14:07:13.595 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547344, seq# expected = 2287547344 221 14:09:09.803 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 222 14:14:10.355 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 223 14:16:53.713 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547344 224 14:16:53.713 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 225 14:16:53.743 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 226 14:16:53.743 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 227 14:16:53.743 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547345, seq# expected = 2287547345 228 14:19:10.430 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547345 229 14:19:10.430 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 14:19:10.430 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 231 14:19:10.450 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 232 14:19:10.450 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 233 14:19:10.450 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547346, seq# expected = 2287547346 234 14:24:10.575 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 235 14:29:10.739 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 236 14:31:08.409 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547346 237 14:31:08.409 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 238 14:31:08.459 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 239 14:31:08.459 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 240 14:31:08.459 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547347, seq# expected = 2287547347 241 14:34:10.710 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 242 14:39:11.246 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 243 14:44:11.388 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 244 14:49:11.822 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 245 14:54:12.274 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 246 14:59:12.736 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 247 15:04:13.218 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 248 15:09:13.344 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 249 15:14:13.460 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 250 15:16:55.722 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547347 251 15:16:55.722 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 252 15:16:55.802 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 253 15:16:55.802 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 254 15:16:55.802 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547348, seq# expected = 2287547348 255 15:19:07.921 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547348 256 15:19:07.921 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 257 15:19:07.941 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 258 15:19:07.941 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 259 15:19:07.941 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547349, seq# expected = 2287547349 260 15:19:13.429 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 261 15:24:14.358 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 262 15:29:14.837 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 263 15:31:07.999 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547349 264 15:31:07.999 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 265 15:31:08.019 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 266 15:31:08.019 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 267 15:31:08.019 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547350, seq# expected = 2287547350 268 15:34:15.286 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 269 15:39:15.415 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 270 15:42:57.750 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547350 271 15:42:57.750 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 272 15:42:57.791 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 273 15:42:57.791 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 274 15:42:57.791 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547351, seq# expected = 2287547351 275 15:43:08.777 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547351 276 15:43:08.777 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 277 15:43:08.797 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 278 15:43:08.797 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 279 15:43:08.797 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547352, seq# expected = 2287547352 280 15:44:15.367 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 281 15:46:55.107 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547352 282 15:46:55.117 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 283 15:46:55.137 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 284 15:46:55.137 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 285 15:46:55.137 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547353, seq# expected = 2287547353 286 15:49:16.310 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 287 15:54:16.742 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 288 15:55:04.320 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547353 289 15:55:04.320 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 290 15:55:04.341 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 291 15:55:04.341 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 292 15:55:04.341 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547354, seq# expected = 2287547354 293 15:55:14.826 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547354 294 15:55:14.826 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 295 15:55:14.856 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 296 15:55:14.856 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 297 15:55:14.856 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547355, seq# expected = 2287547355 298 15:59:17.174 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 299 16:01:55.542 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547355 300 16:01:55.542 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 301 16:02:00.559 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547356 302 16:02:00.559 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 303 16:02:00.579 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 304 16:02:00.579 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 305 16:02:00.579 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547357, seq# expected = 2287547357 306 16:04:17.316 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 307 16:09:17.587 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 308 16:14:18.057 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 309 16:19:11.024 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547357 310 16:19:11.024 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 311 16:19:11.094 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 312 16:19:11.094 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 313 16:19:11.094 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547358, seq# expected = 2287547358 314 16:19:18.034 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 315 16:24:19.477 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 316 16:29:19.918 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 317 16:31:52.872 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547358 318 16:31:52.872 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 319 16:31:52.953 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 320 16:31:52.953 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 321 16:31:52.953 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547359, seq# expected = 2287547359 322 16:34:19.087 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 323 16:39:20.029 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 324 16:44:20.470 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 325 16:46:40.676 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547359 326 16:46:40.676 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 327 16:46:40.706 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 328 16:46:40.706 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 329 16:46:40.706 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547360, seq# expected = 2287547360 330 16:46:51.201 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547360 331 16:46:51.201 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 332 16:46:51.221 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 333 16:46:51.221 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 334 16:46:51.221 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547361, seq# expected = 2287547361 335 16:49:20.885 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 336 16:54:21.267 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 337 16:55:07.333 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547361 338 16:55:07.333 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 339 16:55:07.363 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 340 16:55:07.363 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 341 16:55:07.363 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547362, seq# expected = 2287547362 342 16:59:21.696 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 343 17:04:21.644 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 344 17:07:10.375 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547362 345 17:07:10.375 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 346 17:07:10.405 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 347 17:07:10.405 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 348 17:07:10.405 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547363, seq# expected = 2287547363 349 17:09:22.564 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 350 17:14:22.993 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 351 17:16:53.708 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547363 352 17:16:53.708 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 353 17:16:53.728 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 354 17:16:53.738 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 355 17:16:53.738 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547364, seq# expected = 2287547364 356 17:19:09.903 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547364 357 17:19:09.903 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 358 17:19:09.933 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 359 17:19:09.933 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 360 17:19:09.933 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547365, seq# expected = 2287547365 361 17:19:22.921 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 362 17:24:23.858 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 363 17:29:24.292 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 364 17:31:11.946 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547365 365 17:31:11.946 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 366 17:31:11.976 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 367 17:31:11.976 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 368 17:31:11.976 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547366, seq# expected = 2287547366 369 17:34:24.721 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 370 17:39:25.150 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 371 17:41:57.367 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547366 372 17:41:57.367 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 373 17:42:02.385 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547367 374 17:42:02.385 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 375 17:42:02.415 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 376 17:42:02.415 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 377 17:42:02.415 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547368, seq# expected = 2287547368 378 17:43:07.968 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547368 379 17:43:07.968 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 380 17:43:07.998 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 381 17:43:07.998 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 382 17:43:07.998 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547369, seq# expected = 2287547369 383 17:44:25.078 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 384 17:46:55.804 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547369 385 17:46:55.804 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 386 17:46:55.904 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 387 17:46:55.904 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 388 17:46:55.904 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547370, seq# expected = 2287547370 389 17:49:26.018 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 390 17:54:26.457 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 391 17:59:26.886 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 392 18:01:51.092 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547370 393 18:01:51.092 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 394 18:01:51.122 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 18:01:51.122 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 396 18:01:51.122 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547371, seq# expected = 2287547371 397 18:04:27.315 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 398 18:07:09.046 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547371 399 18:07:09.046 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 400 18:07:09.076 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 401 18:07:09.076 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 402 18:07:09.076 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547372, seq# expected = 2287547372 403 18:09:28.245 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 404 18:14:28.173 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 405 18:16:51.878 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547372 406 18:16:51.878 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 407 18:16:51.948 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 408 18:16:51.948 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 409 18:16:51.948 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547373, seq# expected = 2287547373 410 18:19:13.080 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547373 411 18:19:13.080 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 412 18:19:13.100 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 413 18:19:13.100 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 414 18:19:13.100 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547374, seq# expected = 2287547374 415 18:19:28.101 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 416 18:24:29.071 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 417 18:29:29.120 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 418 18:31:08.268 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547374 419 18:31:08.268 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 420 18:31:08.298 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 421 18:31:08.298 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 422 18:31:08.298 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547375, seq# expected = 2287547375 423 18:31:53.837 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547375 424 18:31:53.837 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 425 18:31:53.857 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 426 18:31:53.857 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 427 18:31:53.857 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547376, seq# expected = 2287547376 428 18:34:29.623 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 429 18:38:25.627 03/04/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x76811f40 is about to expire, requesting a new one 430 18:38:25.627 03/04/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.22, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 431 18:38:25.627 03/04/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=F8DA5560) Initiator = ID=10.13.8.22 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 432 18:38:25.627 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 433 18:38:25.687 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 434 18:38:25.687 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 435 18:38:25.687 03/04/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 436 18:38:25.687 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 437 18:38:25.687 03/04/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=F8DA5560 OUTBOUND SPI = 0x3317E4C8 INBOUND SPI = 0x07A8D6CB) 438 18:38:25.697 03/04/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3317E4C8 439 18:38:25.697 03/04/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x07A8D6CB 440 18:38:25.697 03/04/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 441 18:38:26.158 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 442 18:38:26.158 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc8e41733 into key list 443 18:38:26.158 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 444 18:38:26.158 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xcbd6a807 into key list 445 18:38:55.680 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 446 18:38:55.680 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 447 18:38:55.680 03/04/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 401F8176 INBOUND SPI = F2F2896C) 448 18:38:55.680 03/04/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=B195F672 449 18:38:56.181 03/04/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x6c89f2f2 450 18:38:56.181 03/04/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x6c89f2f2 451 18:38:56.181 03/04/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x76811f40 452 18:38:56.181 03/04/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x76811f40 453 18:39:05.685 03/04/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xc8e41733 for inbound key with SPI=0xcbd6a807 454 18:39:28.718 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 455 18:44:29.243 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 456 18:49:29.728 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 457 18:54:30.173 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 458 18:55:07.728 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547376 459 18:55:07.728 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 460 18:55:07.758 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 461 18:55:07.758 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 462 18:55:07.758 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2287547377, seq# expected = 2287547377 463 18:58:35.048 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547377 464 18:58:35.048 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 465 18:58:40.055 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547378 466 18:58:40.055 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 467 18:58:45.062 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547379 468 18:58:45.062 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 469 18:58:50.100 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547380 470 18:58:50.100 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 471 18:58:55.107 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547381 472 18:58:55.107 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 473 18:59:00.114 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547382 474 18:59:00.114 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 475 18:59:05.121 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547383 476 18:59:05.121 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 477 18:59:10.129 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547384 478 18:59:10.129 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 18:59:15.136 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547385 480 18:59:15.136 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 481 18:59:20.143 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547386 482 18:59:20.143 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 483 18:59:25.150 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547387 484 18:59:25.150 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 485 18:59:30.158 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547388 486 18:59:30.158 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 487 18:59:30.158 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 488 18:59:35.165 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547389 489 18:59:35.165 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 490 18:59:40.172 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547390 491 18:59:40.172 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 492 18:59:45.680 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547391 493 18:59:45.680 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 494 18:59:50.687 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547392 495 18:59:50.687 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 496 18:59:55.695 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547393 497 18:59:55.695 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 498 19:00:00.722 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547394 499 19:00:00.722 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 500 19:00:06.210 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547395 501 19:00:06.210 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 502 19:00:11.217 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547396 503 19:00:11.217 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 504 19:00:16.224 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547397 505 19:00:16.224 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 506 19:00:21.232 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547398 507 19:00:21.232 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 508 19:00:26.239 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547399 509 19:00:26.239 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 510 19:00:31.246 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547400 511 19:00:31.246 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 512 19:00:36.253 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547401 513 19:00:36.253 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 514 19:00:41.261 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547402 515 19:00:41.261 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 516 19:00:46.278 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547403 517 19:00:46.278 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 518 19:00:51.285 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547404 519 19:00:51.285 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 520 19:00:56.302 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547405 521 19:00:56.302 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 522 19:01:01.800 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547406 523 19:01:01.800 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 524 19:01:06.808 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547407 525 19:01:06.808 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 526 19:01:11.815 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547408 527 19:01:11.815 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 528 19:01:16.822 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547409 529 19:01:16.822 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 530 19:01:21.829 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547410 531 19:01:21.829 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 532 19:01:26.837 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547411 533 19:01:26.837 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 534 19:01:32.345 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547412 535 19:01:32.345 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 536 19:01:37.352 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547413 537 19:01:37.352 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 538 19:01:42.359 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547414 539 19:01:42.359 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 540 19:01:47.366 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547415 541 19:01:47.366 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 542 19:01:52.874 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547416 543 19:01:52.874 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 544 19:01:57.882 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547417 545 19:01:57.882 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 546 19:02:02.889 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547418 547 19:02:02.889 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 548 19:02:07.896 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547419 549 19:02:07.906 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 550 19:02:13.404 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547420 551 19:02:13.404 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 552 19:02:18.411 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547421 553 19:02:18.411 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 554 19:02:23.429 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547422 555 19:02:23.439 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 556 19:02:28.937 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547423 557 19:02:28.937 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 558 19:02:33.944 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547424 559 19:02:33.944 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 560 19:02:38.951 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547425 561 19:02:38.951 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 562 19:02:43.968 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547426 563 19:02:43.968 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 564 19:02:49.516 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547427 565 19:02:49.516 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 566 19:02:55.004 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547428 567 19:02:55.004 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 568 19:03:00.012 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547429 569 19:03:00.012 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 570 19:03:05.019 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547430 571 19:03:05.019 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 572 19:03:10.026 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547431 573 19:03:10.036 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 574 19:03:15.534 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547432 575 19:03:15.534 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 576 19:03:20.541 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547433 577 19:03:20.541 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 578 19:03:25.549 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547434 579 19:03:25.549 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 580 19:03:30.556 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547435 581 19:03:30.556 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 582 19:03:35.563 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547436 583 19:03:35.563 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 584 19:03:40.570 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547437 585 19:03:40.570 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 586 19:03:45.578 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547438 587 19:03:45.578 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 588 19:03:50.585 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547439 589 19:03:50.595 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 590 19:03:56.093 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547440 591 19:03:56.093 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 592 19:04:01.100 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547441 593 19:04:01.100 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 594 19:04:06.107 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547442 595 19:04:06.107 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 596 19:04:11.115 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547443 597 19:04:11.115 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 598 19:04:16.122 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547444 599 19:04:16.122 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 600 19:04:21.630 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547445 601 19:04:21.630 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 602 19:04:26.637 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547446 603 19:04:26.637 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 604 19:04:30.643 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1975, dst port 4005 605 19:04:31.644 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547447 606 19:04:31.644 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 607 19:04:36.652 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547448 608 19:04:36.652 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 609 19:04:41.659 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547449 610 19:04:41.659 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 611 19:04:46.666 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547450 612 19:04:46.666 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 613 19:04:51.673 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547451 614 19:04:51.673 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 615 19:04:57.181 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547452 616 19:04:57.181 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 617 19:05:02.188 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547453 618 19:05:02.188 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 619 19:05:07.196 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547454 620 19:05:07.196 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 621 19:05:12.203 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547455 622 19:05:12.203 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 623 19:05:17.210 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547456 624 19:05:17.210 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 625 19:05:22.217 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547457 626 19:05:22.217 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 627 19:05:27.225 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547458 628 19:05:27.225 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 629 19:05:32.232 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547459 630 19:05:32.232 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 631 19:05:37.239 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547460 632 19:05:37.239 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 633 19:05:42.246 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547461 634 19:05:42.246 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 635 19:05:47.254 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547462 636 19:05:47.254 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 637 19:05:52.271 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547463 638 19:05:52.271 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 639 19:05:57.769 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547464 640 19:05:57.769 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 641 19:06:02.796 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547465 642 19:06:02.796 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 643 19:06:07.814 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547466 644 19:06:07.814 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 645 19:06:13.311 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547467 646 19:06:13.311 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 647 19:06:18.809 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547468 648 19:06:18.809 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 649 19:06:23.857 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547469 650 19:06:23.857 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 651 19:06:28.864 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547470 652 19:06:28.864 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 653 19:06:33.871 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547471 654 19:06:33.871 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 655 19:06:38.888 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2287547472 656 19:06:38.888 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 657 19:06:43.896 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 658 19:06:43.896 03/04/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3317E4C8 INBOUND SPI = 7A8D6CB) 659 19:06:43.896 03/04/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=F8DA5560 660 19:06:43.906 03/04/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=CBEBDE2948A8E63D R_Cookie=EF1C2A77CEC234EA) reason = DEL_REASON_PEER_NOT_RESPONDING 661 19:06:43.906 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 662 19:06:44.406 03/04/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xcbd6a807 663 19:06:44.406 03/04/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xcbd6a807 664 19:06:44.406 03/04/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc8e41733 665 19:06:44.406 03/04/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc8e41733 666 19:06:44.406 03/04/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=CBEBDE2948A8E63D R_Cookie=EF1C2A77CEC234EA) reason = DEL_REASON_PEER_NOT_RESPONDING 667 19:06:44.406 03/04/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_PEER_NOT_RESPONDING. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 668 19:06:44.406 03/04/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 669 19:06:44.406 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 670 19:06:44.427 03/04/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1975 for TCP connection. 671 19:06:44.427 03/04/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 6:52:30 672 19:06:44.467 03/04/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 673 19:06:44.477 03/04/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 674 19:06:46.069 03/04/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 675 19:06:46.099 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1975, dst port 4005 676 19:06:46.099 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 677 19:06:46.099 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 678 19:06:46.099 03/04/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x00000000 679 19:06:46.099 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 680 19:06:46.099 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 681 19:06:46.099 03/04/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 682 19:06:46.099 03/04/07 Sev=Warning/2 IKE/0xA3000067 Received an IPC message during invalid state (IKE_MAIN:511) 683 19:06:56.484 03/04/07 Sev=Info/4 CM/0x63100002 Begin connection process 684 19:06:56.504 03/04/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 685 19:06:56.504 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 686 19:06:56.554 03/04/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 4936 for TCP connection. 687 19:06:56.574 03/04/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 688 19:06:56.574 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 689 19:06:56.574 03/04/07 Sev=Info/6 IPSEC/0x6370002B Sent 58593 packets, 0 were fragmented. 690 19:06:56.574 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 4936, dst port 4005 691 19:07:01.932 03/04/07 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw3.emc.com" 692 19:07:01.932 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 693 19:07:02.072 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 694 19:07:02.442 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 4936, dst port 4005 695 19:07:02.442 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 4936, dst port 4005 696 19:07:02.442 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 4936 697 19:07:02.442 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 4936, dst port 4005 698 19:07:02.442 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 699 19:07:02.953 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 700 19:07:02.983 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 701 19:07:03.003 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 702 19:07:03.274 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 703 19:07:03.274 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 704 19:07:03.274 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 705 19:07:03.274 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 706 19:07:03.274 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 707 19:07:03.274 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 708 19:07:03.284 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 709 19:07:03.284 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 710 19:07:03.284 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 711 19:07:03.284 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 712 19:07:03.374 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 713 19:07:03.374 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 714 19:07:03.374 03/04/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 715 19:07:03.374 03/04/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=90C1DE31ECDD236E R_Cookie=7A6368E5E0B1B88F) reason = DEL_REASON_LOAD_BALANCING 716 19:07:03.374 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 717 19:07:03.945 03/04/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=90C1DE31ECDD236E R_Cookie=7A6368E5E0B1B88F) reason = DEL_REASON_LOAD_BALANCING 718 19:07:03.945 03/04/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 719 19:07:03.945 03/04/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 720 19:07:03.945 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 721 19:07:03.965 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 722 19:07:04.936 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 4936, dst port 4005 723 19:07:04.946 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 4936, dst port 4005 724 19:07:04.946 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.16, src port 4005, dst port 4936 725 19:07:04.946 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.16, src port 4936, dst port 4005 726 19:07:04.946 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.16" 727 19:07:05.457 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 728 19:07:05.477 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.16. 729 19:07:05.497 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.16 730 19:07:05.737 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 731 19:07:05.737 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.16 732 19:07:05.737 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 733 19:07:05.737 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 734 19:07:05.737 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 735 19:07:05.737 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 736 19:07:05.737 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 737 19:07:05.737 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.16 738 19:07:05.737 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 739 19:07:05.737 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 740 19:07:05.837 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 741 19:07:05.837 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 742 19:07:05.837 03/04/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 743 19:07:16.683 03/04/07 Sev=Info/4 CM/0x63100017 xAuth application returned 744 19:07:16.683 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 745 19:07:19.247 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 746 19:07:19.247 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 747 19:07:19.247 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 748 19:07:19.247 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 749 19:07:19.287 03/04/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 750 19:07:19.287 03/04/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 751 19:07:19.287 03/04/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 752 19:07:19.287 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 753 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 754 19:07:20.378 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 755 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.11.104 756 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 757 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 758 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 759 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 760 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 761 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas East Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 762 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 763 19:07:20.378 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 764 19:07:20.388 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 765 19:07:20.388 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 766 19:07:20.388 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 767 19:07:20.388 03/04/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 768 19:07:20.388 03/04/07 Sev=Info/4 CM/0x63100019 Mode Config data received 769 19:07:20.408 03/04/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.11.104, GW IP = 128.221.195.16, Remote IP = 0.0.0.0 770 19:07:20.408 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.16 771 19:07:20.408 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 772 19:07:20.408 03/04/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 773 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 774 19:07:20.518 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 775 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 776 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 15 seconds, setting expiry to 86385 seconds from now 777 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 778 19:07:20.518 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 779 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 780 19:07:20.518 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.16 781 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=D5E217E4 OUTBOUND SPI = 0x17F22A14 INBOUND SPI = 0x03206D61) 782 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x17F22A14 783 19:07:20.518 03/04/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x03206D61 784 19:07:20.979 03/04/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.11.104/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 785 19:07:21.039 03/04/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 786 19:07:21.079 03/04/07 Sev=Info/4 CM/0x6310001A One secure connection established 787 19:07:21.330 03/04/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.101. Current address(es): 192.168.1.101, 10.4.11.104, 192.168.6.1, 192.168.5.1. 788 19:07:21.330 03/04/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.11.104. Current address(es): 192.168.1.101, 10.4.11.104, 192.168.6.1, 192.168.5.1. 789 19:07:21.400 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 790 19:07:21.400 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x142af217 into key list 791 19:07:21.400 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 792 19:07:21.400 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x616d2003 into key list 793 19:07:21.400 03/04/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.11.104 794 19:07:24.464 03/04/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x142af217 for inbound key with SPI=0x616d2003 795 19:08:55.124 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2375704022 796 19:08:55.124 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 797 19:08:55.225 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 798 19:08:55.225 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 799 19:08:55.225 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2375704023, seq# expected = 2375704023 800 19:09:56.232 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2375704023 801 19:09:56.232 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 802 19:09:56.332 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 803 19:09:56.332 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 804 19:09:56.332 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2375704024, seq# expected = 2375704024 805 19:10:27.297 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2375704024 806 19:10:27.297 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 807 19:10:27.397 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 808 19:10:27.397 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 809 19:10:27.397 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2375704025, seq# expected = 2375704025 810 19:10:37.832 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2375704025 811 19:10:37.832 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 812 19:10:37.932 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 813 19:10:37.932 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 814 19:10:37.932 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2375704026, seq# expected = 2375704026 815 19:11:03.389 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2375704026 816 19:11:03.389 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 817 19:11:03.499 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 818 19:11:03.499 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 819 19:11:03.499 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2375704027, seq# expected = 2375704027 820 19:12:06.009 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 4936, dst port 4005 821 19:17:06.191 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 4936, dst port 4005 822 19:19:38.570 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2375704027 823 19:19:38.570 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 824 19:19:38.670 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 825 19:19:38.670 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 826 19:19:38.670 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2375704028, seq# expected = 2375704028 827 19:22:06.402 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 4936, dst port 4005