EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 20:08:59.260 03/04/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 20:08:59.291 03/04/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 20:08:59.291 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 20:08:59.311 03/04/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1390 for TCP connection. 5 20:08:59.671 03/04/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 20:08:59.671 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 20:08:59.671 03/04/07 Sev=Info/6 IPSEC/0x6370002B Sent 326 packets, 0 were fragmented. 8 20:08:59.671 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1390, dst port 4005 9 20:09:04.678 03/04/07 Sev=Info/4 CM/0x6310002A Unable to establish TCP connection on port 4005 with server "usvgw3.emc.com" 10 20:09:04.678 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 11 20:09:04.708 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 12 20:09:04.738 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1390, dst port 4005 13 20:09:04.738 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1390, dst port 4005 14 20:09:05.700 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1390 15 20:09:05.700 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1390, dst port 4005 16 20:09:05.700 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 17 20:09:06.180 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 18 20:09:06.210 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 19 20:09:06.230 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 20 20:09:06.451 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 21 20:09:06.451 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 22 20:09:06.451 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 23 20:09:06.451 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 24 20:09:06.451 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 25 20:09:06.451 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 26 20:09:06.461 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 27 20:09:06.461 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 28 20:09:06.461 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 29 20:09:06.461 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 30 20:09:06.551 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 31 20:09:06.551 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 32 20:09:06.551 03/04/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 33 20:09:06.551 03/04/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=287C6E08F4988060 R_Cookie=48597B4FA292601B) reason = DEL_REASON_LOAD_BALANCING 34 20:09:06.551 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 35 20:09:07.192 03/04/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=287C6E08F4988060 R_Cookie=48597B4FA292601B) reason = DEL_REASON_LOAD_BALANCING 36 20:09:07.192 03/04/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 37 20:09:07.192 03/04/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 38 20:09:07.192 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 39 20:09:07.202 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 40 20:09:07.703 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1390, dst port 4005 41 20:09:07.703 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 1390, dst port 4005 42 20:09:07.703 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.16, src port 4005, dst port 1390 43 20:09:07.703 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.16, src port 1390, dst port 4005 44 20:09:07.703 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.16" 45 20:09:08.193 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 46 20:09:08.213 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.16. 47 20:09:08.233 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.16 48 20:09:08.484 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 49 20:09:08.484 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.16 50 20:09:08.484 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 51 20:09:08.484 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 52 20:09:08.484 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 53 20:09:08.484 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 54 20:09:08.484 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 55 20:09:08.484 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.16 56 20:09:08.484 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 57 20:09:08.484 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 58 20:09:08.594 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 59 20:09:08.594 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 60 20:09:08.594 03/04/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 61 20:09:17.657 03/04/07 Sev=Info/4 CM/0x63100017 xAuth application returned 62 20:09:17.657 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 63 20:09:22.083 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 64 20:09:22.083 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 65 20:09:22.083 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 66 20:09:22.083 03/04/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3BB9B0450D74AA4B R_Cookie=15B8AE731F3A2819) reason = DEL_REASON_WE_FAILED_AUTH 67 20:09:22.083 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.16 68 20:09:22.203 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 69 20:09:22.203 03/04/07 Sev=Info/4 IKE/0x63000057 Received an ISAKMP message for a non-active SA, I_Cookie=3BB9B0450D74AA4B R_Cookie=15B8AE731F3A2819 70 20:09:22.203 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 128.221.195.16 71 20:09:22.704 03/04/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3BB9B0450D74AA4B R_Cookie=15B8AE731F3A2819) reason = DEL_REASON_WE_FAILED_AUTH 72 20:09:22.704 03/04/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "128.221.195.16" because of "DEL_REASON_WE_FAILED_AUTH" 73 20:09:22.704 03/04/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 74 20:09:22.704 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 75 20:09:22.714 03/04/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1390 for TCP connection. 76 20:09:22.724 03/04/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 77 20:09:22.724 03/04/07 Sev=Info/6 IPSEC/0x6370001D TCP RST received from 128.221.195.16, src port 4005, dst port 1390 78 20:09:22.724 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.16, src port 1390, dst port 4005 79 20:09:22.724 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 80 20:09:22.724 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 81 20:09:22.724 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 82 20:09:22.724 03/04/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 83 20:09:27.371 03/04/07 Sev=Info/4 CM/0x63100002 Begin connection process 84 20:09:27.401 03/04/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 85 20:09:27.401 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 86 20:09:27.411 03/04/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1401 for TCP connection. 87 20:09:27.721 03/04/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 88 20:09:27.721 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 89 20:09:27.721 03/04/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 90 20:09:27.721 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1401, dst port 4005 91 20:09:27.721 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1401 92 20:09:27.721 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1401, dst port 4005 93 20:09:27.721 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 94 20:09:28.212 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 95 20:09:28.212 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 96 20:09:28.222 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 97 20:09:28.462 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 98 20:09:28.472 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 99 20:09:28.472 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 100 20:09:28.472 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 101 20:09:28.472 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 102 20:09:28.472 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 103 20:09:28.472 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 104 20:09:28.472 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 105 20:09:28.472 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 106 20:09:28.472 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 107 20:09:28.573 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 108 20:09:28.573 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 109 20:09:28.573 03/04/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 110 20:09:28.573 03/04/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=DFB0B438C3698FB6 R_Cookie=48BFED72173C3B1C) reason = DEL_REASON_LOAD_BALANCING 111 20:09:28.573 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 112 20:09:29.214 03/04/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=DFB0B438C3698FB6 R_Cookie=48BFED72173C3B1C) reason = DEL_REASON_LOAD_BALANCING 113 20:09:29.214 03/04/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 114 20:09:29.214 03/04/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 115 20:09:29.214 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 116 20:09:29.234 03/04/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 117 20:09:29.724 03/04/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1401, dst port 4005 118 20:09:29.724 03/04/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 1401, dst port 4005 119 20:09:29.724 03/04/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.16, src port 4005, dst port 1401 120 20:09:29.724 03/04/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.16, src port 1401, dst port 4005 121 20:09:29.724 03/04/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.16" 122 20:09:30.215 03/04/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 123 20:09:30.245 03/04/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.16. 124 20:09:30.265 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.16 125 20:09:30.505 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 126 20:09:30.505 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.16 127 20:09:30.505 03/04/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 128 20:09:30.505 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 129 20:09:30.505 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 130 20:09:30.505 03/04/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 131 20:09:30.515 03/04/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 132 20:09:30.515 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.16 133 20:09:30.515 03/04/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 134 20:09:30.515 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 135 20:09:30.606 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 136 20:09:30.606 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 137 20:09:30.606 03/04/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 138 20:09:40.309 03/04/07 Sev=Info/4 CM/0x63100017 xAuth application returned 139 20:09:40.309 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 140 20:09:52.878 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 141 20:09:52.878 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 142 20:09:52.878 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 143 20:09:52.878 03/04/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 144 20:09:52.928 03/04/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 145 20:09:52.928 03/04/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 146 20:09:52.928 03/04/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 147 20:09:52.928 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 148 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 149 20:09:53.839 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 150 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.8.187 151 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 152 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 153 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 154 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 155 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 156 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas East Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 157 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 158 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 159 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 160 20:09:53.839 03/04/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 161 20:09:53.839 03/04/07 Sev=Info/4 CM/0x63100019 Mode Config data received 162 20:09:53.859 03/04/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.8.187, GW IP = 128.221.195.16, Remote IP = 0.0.0.0 163 20:09:53.859 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.16 164 20:09:53.959 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 165 20:09:53.959 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 166 20:09:53.959 03/04/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 167 20:09:53.959 03/04/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 23 seconds, setting expiry to 86377 seconds from now 168 20:09:53.959 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 169 20:09:53.959 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 170 20:09:53.959 03/04/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 171 20:09:53.969 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.16 172 20:09:53.969 03/04/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=6BC80F35 OUTBOUND SPI = 0x6811E3A1 INBOUND SPI = 0x172CCB88) 173 20:09:53.969 03/04/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x6811E3A1 174 20:09:53.969 03/04/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x172CCB88 175 20:09:54.590 03/04/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.8.187/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 176 20:09:54.630 03/04/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 177 20:09:54.650 03/04/07 Sev=Info/4 CM/0x6310001A One secure connection established 178 20:09:54.991 03/04/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.101. Current address(es): 192.168.1.101, 10.4.8.187, 192.168.6.1, 192.168.5.1. 179 20:09:54.991 03/04/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.8.187. Current address(es): 192.168.1.101, 10.4.8.187, 192.168.6.1, 192.168.5.1. 180 20:09:55.031 03/04/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 181 20:09:55.031 03/04/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 182 20:09:55.031 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 183 20:09:55.031 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa1e31168 into key list 184 20:09:55.031 03/04/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 185 20:09:55.031 03/04/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x88cb2c17 into key list 186 20:09:55.031 03/04/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.8.187 187 20:09:55.762 03/04/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xa1e31168 for inbound key with SPI=0x88cb2c17 188 20:10:18.294 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155116 189 20:10:18.294 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 190 20:10:18.394 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 191 20:10:18.394 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 192 20:10:18.394 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155117, seq# expected = 4004155117 193 20:10:53.845 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155117 194 20:10:53.845 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 195 20:10:53.945 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 196 20:10:53.945 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 197 20:10:53.945 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155118, seq# expected = 4004155118 198 20:11:24.930 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155118 199 20:11:24.930 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 200 20:11:25.030 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 201 20:11:25.030 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 202 20:11:25.030 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155119, seq# expected = 4004155119 203 20:12:25.517 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155119 204 20:12:25.517 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 205 20:12:25.617 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 206 20:12:25.617 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 207 20:12:25.617 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155120, seq# expected = 4004155120 208 20:14:31.238 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 209 20:19:30.769 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 210 20:21:41.016 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155120 211 20:21:41.016 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 212 20:21:41.126 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 213 20:21:41.126 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 214 20:21:41.126 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155121, seq# expected = 4004155121 215 20:23:02.183 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155121 216 20:23:02.183 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 217 20:23:02.273 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 218 20:23:02.273 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 219 20:23:02.273 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155122, seq# expected = 4004155122 220 20:24:30.319 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 221 20:26:00.469 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155122 222 20:26:00.469 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 223 20:26:00.569 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 224 20:26:00.569 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 225 20:26:00.569 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155123, seq# expected = 4004155123 226 20:29:30.841 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 227 20:32:23.590 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155123 228 20:32:23.590 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 229 20:32:23.690 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 230 20:32:23.690 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 231 20:32:23.690 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155124, seq# expected = 4004155124 232 20:34:15.752 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155124 233 20:34:15.752 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 234 20:34:15.852 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 235 20:34:15.852 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 236 20:34:15.852 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155125, seq# expected = 4004155125 237 20:34:30.774 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 238 20:39:31.720 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 239 20:42:23.969 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155125 240 20:42:23.969 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 241 20:42:24.059 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 242 20:42:24.059 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 243 20:42:24.059 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155126, seq# expected = 4004155126 244 20:44:32.164 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 245 20:46:10.799 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155126 246 20:46:10.799 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 247 20:46:10.899 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 248 20:46:10.899 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 249 20:46:10.899 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155127, seq# expected = 4004155127 250 20:49:32.575 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 251 20:54:32.995 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 252 20:57:27.739 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155127 253 20:57:27.739 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 254 20:57:27.830 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 255 20:57:27.830 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 256 20:57:27.830 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155128, seq# expected = 4004155128 257 20:58:08.296 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155128 258 20:58:08.296 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 259 20:58:08.406 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 260 20:58:08.406 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 261 20:58:08.406 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155129, seq# expected = 4004155129 262 20:59:19.406 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155129 263 20:59:19.406 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 264 20:59:19.516 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 265 20:59:19.516 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 266 20:59:19.516 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155130, seq# expected = 4004155130 267 20:59:29.920 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155130 268 20:59:29.920 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 269 20:59:30.020 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 270 20:59:30.020 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 271 20:59:30.020 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155131, seq# expected = 4004155131 272 20:59:32.924 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 273 21:04:33.897 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 274 21:09:34.361 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 275 21:12:27.622 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155131 276 21:12:27.622 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 277 21:12:27.712 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 278 21:12:27.712 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 279 21:12:27.712 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155132, seq# expected = 4004155132 280 21:14:34.806 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 281 21:19:34.923 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 282 21:22:10.633 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155132 283 21:22:10.633 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 284 21:22:10.753 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 285 21:22:10.753 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 286 21:22:10.753 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155133, seq# expected = 4004155133 287 21:24:35.335 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 288 21:27:28.085 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155133 289 21:27:28.085 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 290 21:27:28.206 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 291 21:27:28.206 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 292 21:27:28.206 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155134, seq# expected = 4004155134 293 21:29:35.770 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 294 21:34:05.160 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155134 295 21:34:05.160 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 296 21:34:05.270 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 297 21:34:05.270 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 298 21:34:05.270 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155135, seq# expected = 4004155135 299 21:34:35.705 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 300 21:39:36.132 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 301 21:42:26.377 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155135 302 21:42:26.377 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 303 21:42:26.477 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 304 21:42:26.477 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 305 21:42:26.477 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155136, seq# expected = 4004155136 306 21:44:37.066 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 307 21:46:07.697 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155136 308 21:46:07.697 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 309 21:46:07.798 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 310 21:46:07.798 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 311 21:46:07.798 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155137, seq# expected = 4004155137 312 21:49:37.501 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 313 21:54:37.954 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 314 21:57:26.184 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155137 315 21:57:26.184 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 316 21:57:26.284 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 317 21:57:26.284 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 318 21:57:26.284 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155138, seq# expected = 4004155138 319 21:58:11.750 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155138 320 21:58:11.750 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 321 21:58:11.850 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 322 21:58:11.850 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 323 21:58:11.850 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155139, seq# expected = 4004155139 324 21:59:37.875 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 325 22:04:38.830 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 326 22:09:39.814 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 327 22:11:26.006 03/04/07 Sev=Info/6 IPSEC/0x63700023 CNIReceiveComplete: Invalid TCP checksum 328 22:11:26.006 03/04/07 Sev=Warning/2 IPSEC/0xE3700010 BSafe ESP Decrypt HMAC mismatch. 329 22:11:26.006 03/04/07 Sev=Warning/2 IPSEC/0xE3700003 Function BSafeESPDecrypt() failed with an error code of 0xffffffff (IpSecDrvTransform.c:1652) 330 22:14:36.783 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155139 331 22:14:36.783 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 332 22:14:36.903 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 333 22:14:36.903 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 334 22:14:36.903 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155140, seq# expected = 4004155140 335 22:14:39.787 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 336 22:19:39.789 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 337 22:24:40.261 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 338 22:29:40.725 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 339 22:34:13.118 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155140 340 22:34:13.118 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 341 22:34:13.228 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 342 22:34:13.228 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 343 22:34:13.228 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155141, seq# expected = 4004155141 344 22:34:40.657 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 345 22:39:41.600 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 346 22:42:23.833 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155141 347 22:42:23.833 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 348 22:42:23.933 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 349 22:42:23.933 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 350 22:42:23.933 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155142, seq# expected = 4004155142 351 22:44:42.035 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 352 22:46:11.166 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155142 353 22:46:11.166 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 354 22:46:11.277 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 355 22:46:11.277 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 356 22:46:11.277 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155143, seq# expected = 4004155143 357 22:49:42.707 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 358 22:54:42.641 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 359 22:57:28.882 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155143 360 22:57:28.882 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 361 22:57:28.992 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 362 22:57:28.992 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 363 22:57:28.992 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155144, seq# expected = 4004155144 364 22:58:09.941 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155144 365 22:58:09.941 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 366 22:58:10.041 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 367 22:58:10.041 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 368 22:58:10.041 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155145, seq# expected = 4004155145 369 22:59:42.575 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 370 23:04:43.490 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 371 23:09:44.415 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 372 23:13:53.271 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155145 373 23:13:53.271 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 374 23:13:53.371 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 375 23:13:53.371 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 376 23:13:53.371 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155146, seq# expected = 4004155146 377 23:14:43.843 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 378 23:19:45.273 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 379 23:22:07.977 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155146 380 23:22:07.977 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 381 23:22:08.097 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 382 23:22:08.097 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 383 23:22:08.107 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155147, seq# expected = 4004155147 384 23:24:45.202 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 385 23:27:28.435 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155147 386 23:27:28.435 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 387 23:27:28.535 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 388 23:27:28.535 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 389 23:27:28.535 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155148, seq# expected = 4004155148 390 23:29:45.631 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 391 23:34:07.504 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155148 392 23:34:07.504 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 393 23:34:07.605 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 394 23:34:07.605 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 395 23:34:07.605 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155149, seq# expected = 4004155149 396 23:34:45.559 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 397 23:39:46.506 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 398 23:42:26.737 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155149 399 23:42:26.737 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 400 23:42:26.837 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 401 23:42:26.837 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 402 23:42:26.837 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155150, seq# expected = 4004155150 403 23:44:46.938 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 404 23:46:04.550 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155150 405 23:46:04.550 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 406 23:46:04.640 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 407 23:46:04.650 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 408 23:46:04.650 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155151, seq# expected = 4004155151 409 23:49:47.370 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 410 23:54:47.812 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 411 23:57:28.043 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155151 412 23:57:28.043 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 413 23:57:28.143 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 414 23:57:28.143 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 415 23:57:28.143 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155152, seq# expected = 4004155152 416 23:58:03.594 03/04/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155152 417 23:58:03.594 03/04/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 418 23:58:03.694 03/04/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 419 23:58:03.694 03/04/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 420 23:58:03.694 03/04/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155153, seq# expected = 4004155153 421 23:59:47.754 03/04/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 422 00:04:48.676 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 423 00:09:49.110 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 424 00:12:28.342 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155153 425 00:12:28.342 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 426 00:12:28.442 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 427 00:12:28.442 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 428 00:12:28.442 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155154, seq# expected = 4004155154 429 00:14:50.047 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 430 00:15:30.605 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155154 431 00:15:30.605 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 432 00:15:30.706 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 433 00:15:30.706 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 434 00:15:30.706 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155155, seq# expected = 4004155155 435 00:15:41.121 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155155 436 00:15:41.121 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 437 00:15:41.231 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 438 00:15:41.231 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 439 00:15:41.231 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155156, seq# expected = 4004155156 440 00:19:49.978 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 441 00:20:14.514 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155156 442 00:20:14.514 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 443 00:20:14.614 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 444 00:20:14.614 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 445 00:20:14.614 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155157, seq# expected = 4004155157 446 00:22:05.173 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155157 447 00:22:05.173 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 448 00:22:05.263 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 449 00:22:05.273 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 450 00:22:05.273 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155158, seq# expected = 4004155158 451 00:24:50.911 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 452 00:26:06.520 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155158 453 00:26:06.520 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 454 00:26:06.620 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 455 00:26:06.630 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 456 00:26:06.630 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155159, seq# expected = 4004155159 457 00:29:50.852 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 458 00:34:05.218 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155159 459 00:34:05.218 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 460 00:34:05.318 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 461 00:34:05.318 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 462 00:34:05.318 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155160, seq# expected = 4004155160 463 00:34:50.784 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 464 00:39:51.716 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 465 00:42:23.935 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155160 466 00:42:23.935 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 467 00:42:24.045 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 468 00:42:24.045 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 469 00:42:24.045 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155161, seq# expected = 4004155161 470 00:44:52.141 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 471 00:49:52.554 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 472 00:54:52.980 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 473 00:57:23.694 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155161 474 00:57:23.694 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 475 00:57:23.794 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 476 00:57:23.794 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 477 00:57:23.794 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155162, seq# expected = 4004155162 478 00:58:04.252 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155162 479 00:58:04.252 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 480 00:58:04.352 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 481 00:58:04.352 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 482 00:58:04.352 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155163, seq# expected = 4004155163 483 00:59:52.916 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 484 01:04:53.832 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 485 01:09:54.258 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 486 01:12:26.975 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155163 487 01:12:26.975 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 488 01:12:27.075 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 489 01:12:27.075 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 490 01:12:27.075 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155164, seq# expected = 4004155164 491 01:14:54.684 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 492 01:19:54.633 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 493 01:22:06.338 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155164 494 01:22:06.338 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 495 01:22:06.439 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 496 01:22:06.439 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 497 01:22:06.439 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155165, seq# expected = 4004155165 498 01:23:37.970 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155165 499 01:23:37.970 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 500 01:23:38.070 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 501 01:23:38.070 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 502 01:23:38.070 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155166, seq# expected = 4004155166 503 01:24:55.091 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 504 01:27:23.795 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155166 505 01:27:23.795 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 506 01:27:23.885 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 507 01:27:23.885 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 508 01:27:23.895 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155167, seq# expected = 4004155167 509 01:29:55.513 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 510 01:34:55.965 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 511 01:39:56.898 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 512 01:42:27.615 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155167 513 01:42:27.615 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 514 01:42:27.715 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 515 01:42:27.715 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 516 01:42:27.715 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155168, seq# expected = 4004155168 517 01:44:57.330 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 518 01:49:57.762 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 519 01:54:58.194 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 520 01:57:27.408 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155168 521 01:57:27.408 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 522 01:57:27.509 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 523 01:57:27.509 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 524 01:57:27.509 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155169, seq# expected = 4004155169 525 01:58:03.460 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155169 526 01:58:03.460 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 527 01:58:03.570 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 528 01:58:03.570 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 529 01:58:03.570 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155170, seq# expected = 4004155170 530 01:59:58.125 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 531 02:04:59.058 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 532 02:09:59.490 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 533 02:12:27.703 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155170 534 02:12:27.703 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 535 02:12:27.803 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 536 02:12:27.803 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 537 02:12:27.803 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155171, seq# expected = 4004155171 538 02:14:59.922 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 539 02:15:56.503 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155171 540 02:15:56.503 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 541 02:15:56.603 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 542 02:15:56.603 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 543 02:15:56.603 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155172, seq# expected = 4004155172 544 02:20:00.354 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 545 02:22:14.547 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155172 546 02:22:14.547 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 547 02:22:14.667 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 548 02:22:14.667 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 549 02:22:14.667 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155173, seq# expected = 4004155173 550 02:22:25.062 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155173 551 02:22:25.062 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 552 02:22:25.162 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 553 02:22:25.162 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 554 02:22:25.162 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155174, seq# expected = 4004155174 555 02:25:00.786 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 556 02:27:28.499 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155174 557 02:27:28.499 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 558 02:27:28.600 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 559 02:27:28.600 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 560 02:27:28.600 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155175, seq# expected = 4004155175 561 02:30:01.208 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 562 02:33:59.547 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155175 563 02:33:59.547 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 564 02:33:59.648 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 565 02:33:59.648 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 566 02:33:59.648 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155176, seq# expected = 4004155176 567 02:34:44.111 03/05/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xa1e31168 is about to expire, requesting a new one 568 02:34:44.111 03/05/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.8.187, GW IP = 128.221.195.16, Remote IP = 0.0.0.0 569 02:34:44.111 03/05/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=3DF14643) Initiator = ID=10.4.8.187 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 570 02:34:44.121 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.16 571 02:34:44.211 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 572 02:34:44.211 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 573 02:34:44.211 03/05/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 574 02:34:44.221 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.16 575 02:34:44.221 03/05/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=3DF14643 OUTBOUND SPI = 0x4BBF7F43 INBOUND SPI = 0x15B540DE) 576 02:34:44.221 03/05/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4BBF7F43 577 02:34:44.221 03/05/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x15B540DE 578 02:34:44.221 03/05/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 579 02:34:44.622 03/05/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 580 02:34:44.622 03/05/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x437fbf4b into key list 581 02:34:44.622 03/05/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 582 02:34:44.622 03/05/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xde40b515 into key list 583 02:35:01.145 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 584 02:35:14.214 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 585 02:35:14.214 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 128.221.195.16 586 02:35:14.214 03/05/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 6811E3A1 INBOUND SPI = 172CCB88) 587 02:35:14.214 03/05/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=6BC80F35 588 02:35:14.665 03/05/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x88cb2c17 589 02:35:14.665 03/05/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x88cb2c17 590 02:35:14.665 03/05/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xa1e31168 591 02:35:14.665 03/05/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xa1e31168 592 02:35:44.698 03/05/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x437fbf4b for inbound key with SPI=0xde40b515 593 02:40:02.065 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 594 02:42:28.274 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155176 595 02:42:28.274 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 596 02:42:28.374 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 597 02:42:28.374 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 598 02:42:28.374 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155177, seq# expected = 4004155177 599 02:45:02.494 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 600 02:50:03.424 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 601 02:57:27.558 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155177 602 02:57:27.558 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 603 02:57:27.658 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 604 02:57:27.658 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 605 02:57:27.658 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155178, seq# expected = 4004155178 606 02:57:58.112 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155178 607 02:57:58.112 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 608 02:57:58.202 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 609 02:57:58.202 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 610 02:57:58.202 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155179, seq# expected = 4004155179 611 03:00:03.781 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 612 03:05:04.210 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 613 03:10:04.639 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 614 03:12:25.841 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155179 615 03:12:25.841 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 616 03:12:25.941 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 617 03:12:25.941 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 618 03:12:25.941 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155180, seq# expected = 4004155180 619 03:15:04.577 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 620 03:20:05.497 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 621 03:25:05.936 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 622 03:27:28.139 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155180 623 03:27:28.139 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 624 03:27:28.239 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 625 03:27:28.239 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 626 03:27:28.239 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155181, seq# expected = 4004155181 627 03:30:06.375 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 628 03:30:19.894 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155181 629 03:30:19.894 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 630 03:30:19.995 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 631 03:30:19.995 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 632 03:30:19.995 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155182, seq# expected = 4004155182 633 03:33:56.203 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155182 634 03:33:56.203 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 635 03:33:56.304 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 636 03:33:56.304 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 637 03:33:56.304 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155183, seq# expected = 4004155183 638 03:35:06.313 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 639 03:40:07.273 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 640 03:42:24.971 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155183 641 03:42:24.971 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 642 03:42:25.071 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 643 03:42:25.071 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 644 03:42:25.071 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155184, seq# expected = 4004155184 645 03:45:07.705 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 646 03:50:07.646 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 647 03:55:08.569 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 648 03:57:25.776 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155184 649 03:57:25.776 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 650 03:57:25.866 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 651 03:57:25.866 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 652 03:57:25.866 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155185, seq# expected = 4004155185 653 03:57:56.811 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155185 654 03:57:56.811 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 655 03:57:56.901 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 656 03:57:56.901 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 657 03:57:56.901 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155186, seq# expected = 4004155186 658 04:00:09.001 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 659 04:05:09.443 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 660 04:10:09.875 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 661 04:12:24.068 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155186 662 04:12:24.068 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 663 04:12:24.168 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 664 04:12:24.168 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 665 04:12:24.168 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155187, seq# expected = 4004155187 666 04:15:10.307 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 667 04:16:14.399 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155187 668 04:16:14.399 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 669 04:16:14.499 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 670 04:16:14.499 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 671 04:16:14.499 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155188, seq# expected = 4004155188 672 04:20:10.749 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 673 04:25:11.181 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 674 04:26:43.313 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155188 675 04:26:43.313 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 676 04:26:43.413 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 677 04:26:43.413 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 678 04:26:43.413 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155189, seq# expected = 4004155189 679 04:27:23.882 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155189 680 04:27:23.882 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 681 04:27:23.972 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 682 04:27:23.972 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 683 04:27:23.972 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155190, seq# expected = 4004155190 684 04:30:11.633 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 685 04:35:12.065 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 686 04:40:12.497 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 687 04:42:23.684 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155190 688 04:42:23.684 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 689 04:42:23.785 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 690 04:42:23.785 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 691 04:42:23.785 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155191, seq# expected = 4004155191 692 04:45:13.415 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 693 04:50:13.838 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 694 04:55:13.779 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 695 04:57:28.473 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155191 696 04:57:28.473 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 697 04:57:28.573 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 698 04:57:28.573 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 699 04:57:28.573 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155192, seq# expected = 4004155192 700 05:00:14.211 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 701 05:05:14.653 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 702 05:10:15.586 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 703 05:12:26.274 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155192 704 05:12:26.274 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 705 05:12:26.374 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 706 05:12:26.374 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 707 05:12:26.374 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155193, seq# expected = 4004155193 708 05:15:16.028 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 709 05:17:08.680 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155193 710 05:17:08.680 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 711 05:17:08.780 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 712 05:17:08.780 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 713 05:17:08.780 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155194, seq# expected = 4004155194 714 05:17:19.195 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155194 715 05:17:19.195 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 716 05:17:19.295 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 717 05:17:19.295 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 718 05:17:19.295 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155195, seq# expected = 4004155195 719 05:20:16.450 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 720 05:25:16.882 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 721 05:30:16.823 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 722 05:35:17.255 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 723 05:40:17.687 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 724 05:42:27.363 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155195 725 05:42:27.363 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 726 05:42:27.464 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 727 05:42:27.464 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 728 05:42:27.464 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155196, seq# expected = 4004155196 729 05:45:18.620 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 730 05:50:19.052 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 731 05:55:18.996 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 732 05:57:23.675 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155196 733 05:57:23.675 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 734 05:57:23.775 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 735 05:57:23.775 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 736 05:57:23.775 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155197, seq# expected = 4004155197 737 06:00:19.428 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 738 06:10:20.793 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 739 06:10:43.826 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155197 740 06:10:43.826 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 741 06:10:43.926 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 742 06:10:43.926 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 743 06:10:43.926 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155198, seq# expected = 4004155198 744 06:12:25.472 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155198 745 06:12:25.472 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 746 06:12:25.572 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 747 06:12:25.572 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 748 06:12:25.572 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155199, seq# expected = 4004155199 749 06:15:20.724 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 750 06:20:21.657 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 751 06:25:21.087 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 752 06:27:02.733 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155199 753 06:27:02.733 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 754 06:27:02.834 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 755 06:27:02.834 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 756 06:27:02.834 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155200, seq# expected = 4004155200 757 06:27:28.270 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155200 758 06:27:28.270 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 759 06:27:28.380 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 760 06:27:28.380 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 761 06:27:28.380 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155201, seq# expected = 4004155201 762 06:30:22.040 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 763 06:35:22.472 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 764 06:40:22.403 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 765 06:42:27.083 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155201 766 06:42:27.083 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 767 06:42:27.183 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 768 06:42:27.183 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 769 06:42:27.183 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155202, seq# expected = 4004155202 770 06:45:22.845 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 771 06:50:23.768 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 772 06:55:24.220 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 773 06:57:26.886 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155202 774 06:57:26.886 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 775 06:57:26.987 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 776 06:57:26.987 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 777 06:57:26.987 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155203, seq# expected = 4004155203 778 07:00:25.143 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 779 07:04:04.959 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155203 780 07:04:04.959 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 781 07:04:05.059 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 782 07:04:05.059 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 783 07:04:05.059 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155204, seq# expected = 4004155204 784 07:05:24.573 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 785 07:10:25.506 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 786 07:12:01.143 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155204 787 07:12:01.143 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 788 07:12:01.254 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 789 07:12:01.254 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 790 07:12:01.254 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155205, seq# expected = 4004155205 791 07:12:11.659 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155205 792 07:12:11.659 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 793 07:12:11.759 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 794 07:12:11.759 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 795 07:12:11.759 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155206, seq# expected = 4004155206 796 07:12:27.181 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155206 797 07:12:27.181 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 798 07:12:27.291 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 799 07:12:27.291 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 800 07:12:27.291 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155207, seq# expected = 4004155207 801 07:15:25.948 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 802 07:16:02.991 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155207 803 07:16:02.991 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 804 07:16:03.091 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 805 07:16:03.091 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 806 07:16:03.091 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155208, seq# expected = 4004155208 807 07:20:26.370 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 808 07:24:14.698 03/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 4004155208 809 07:24:14.698 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 810 07:24:14.798 03/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 811 07:24:14.798 03/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 812 07:24:14.798 03/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 4004155209, seq# expected = 4004155209 813 07:25:26.311 03/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1401, dst port 4005 814 07:26:47.919 03/05/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 815 07:26:47.919 03/05/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 816 07:26:47.919 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 128.221.195.16 817 07:26:47.919 03/05/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4BBF7F43 INBOUND SPI = 15B540DE) 818 07:26:47.919 03/05/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=3DF14643 819 07:26:47.919 03/05/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3AAFB444920E7F2D R_Cookie=D746136820AF6C8B) reason = DEL_REASON_RESET_SADB 820 07:26:47.919 03/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.16 821 07:26:47.919 03/05/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3AAFB444920E7F2D R_Cookie=D746136820AF6C8B) reason = DEL_REASON_RESET_SADB 822 07:26:47.919 03/05/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 823 07:26:47.919 03/05/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 824 07:26:47.969 03/05/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 825 07:26:47.969 03/05/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1401 for TCP connection. 826 07:26:47.969 03/05/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 128.221.195.16 disconnected: duration: 0 days 11:16:53 827 07:26:47.979 03/05/07 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 828 07:26:47.979 03/05/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 829 07:26:49.411 03/05/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 830 07:26:49.411 03/05/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 831 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xde40b515 832 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xde40b515 833 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x437fbf4b 834 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x437fbf4b 835 07:26:49.421 03/05/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.16, src port 1401, dst port 4005 836 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 837 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 838 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 839 07:26:49.421 03/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys