EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 23:02:10.703 03/06/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 23:02:10.844 03/06/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 23:02:10.844 03/06/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 23:02:10.954 03/06/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1586 for TCP connection. 5 23:02:10.964 03/06/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 23:02:10.964 03/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 23:02:10.964 03/06/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1586, dst port 4005 8 23:02:11.865 03/06/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1586 9 23:02:11.865 03/06/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1586, dst port 4005 10 23:02:11.865 03/06/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 23:02:12.366 03/06/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 23:02:12.376 03/06/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 23:02:12.386 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 23:02:12.566 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 23:02:12.566 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 23:02:12.566 03/06/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 23:02:12.566 03/06/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 23:02:12.566 03/06/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 23:02:12.566 03/06/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 23:02:12.586 03/06/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 23:02:12.586 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 23:02:12.586 03/06/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 23:02:12.586 03/06/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 23:02:12.616 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 23:02:12.616 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 23:02:12.616 03/06/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 23:02:12.616 03/06/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8DE93C0EF00CCB5A R_Cookie=D610565909D78178) reason = DEL_REASON_LOAD_BALANCING 28 23:02:12.616 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 23:02:13.367 03/06/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8DE93C0EF00CCB5A R_Cookie=D610565909D78178) reason = DEL_REASON_LOAD_BALANCING 30 23:02:13.367 03/06/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 23:02:13.367 03/06/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 23:02:13.367 03/06/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 23:02:13.387 03/06/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 23:02:13.868 03/06/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1586, dst port 4005 35 23:02:13.868 03/06/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1586, dst port 4005 36 23:02:13.868 03/06/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1586 37 23:02:13.868 03/06/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1586, dst port 4005 38 23:02:13.868 03/06/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 23:02:14.369 03/06/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 23:02:14.389 03/06/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 23:02:14.399 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 23:02:14.579 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 23:02:14.579 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 23:02:14.579 03/06/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 23:02:14.579 03/06/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 23:02:14.579 03/06/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 23:02:14.579 03/06/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 23:02:14.589 03/06/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 23:02:14.589 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 23:02:14.589 03/06/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 23:02:14.589 03/06/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 23:02:14.609 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 23:02:14.609 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 23:02:14.609 03/06/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 23:02:23.181 03/06/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 23:02:23.181 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 23:02:25.865 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 23:02:25.865 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 23:02:25.865 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 23:02:25.865 03/06/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 23:02:25.915 03/06/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 23:02:25.915 03/06/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 23:02:25.915 03/06/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 23:02:25.915 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 23:02:26.927 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.68 68 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 23:02:26.927 03/06/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 23:02:26.927 03/06/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 23:02:26.937 03/06/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.68, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 23:02:26.947 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 23:02:26.977 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 23:02:26.977 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 23:02:26.977 03/06/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 23:02:26.977 03/06/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 12 seconds, setting expiry to 86388 seconds from now 87 23:02:26.987 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 23:02:26.987 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 23:02:26.987 03/06/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 23:02:26.987 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 23:02:26.987 03/06/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=E4F8C6AD OUTBOUND SPI = 0x1094BB22 INBOUND SPI = 0x1BD903EC) 92 23:02:26.987 03/06/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x1094BB22 93 23:02:26.987 03/06/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x1BD903EC 94 23:02:29.551 03/06/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.68/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 23:02:29.601 03/06/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 23:02:29.631 03/06/07 Sev=Info/4 CM/0x6310001A One secure connection established 97 23:02:29.711 03/06/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.101. Current address(es): 192.168.1.101, 10.13.8.68, 192.168.6.1, 192.168.5.1. 98 23:02:29.711 03/06/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.68. Current address(es): 192.168.1.101, 10.13.8.68, 192.168.6.1, 192.168.5.1. 99 23:02:30.011 03/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 23:02:30.011 03/06/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 23:02:30.011 03/06/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 23:02:30.011 03/06/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x22bb9410 into key list 103 23:02:30.011 03/06/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 23:02:30.011 03/06/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xec03d91b into key list 105 23:02:30.011 03/06/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.68 106 23:02:33.917 03/06/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x22bb9410 for inbound key with SPI=0xec03d91b 107 23:03:56.448 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111891 108 23:03:56.448 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 23:03:56.468 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 23:03:56.468 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 23:03:56.468 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111892, seq# expected = 3483111892 112 23:04:57.953 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111892 113 23:04:57.953 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 114 23:04:57.973 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 23:04:57.973 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 23:04:57.973 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111893, seq# expected = 3483111893 117 23:07:14.952 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 118 23:08:28.516 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111893 119 23:08:28.516 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 120 23:08:28.547 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 121 23:08:28.547 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 122 23:08:28.547 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111894, seq# expected = 3483111894 123 23:08:54.053 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111894 124 23:08:54.053 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 125 23:08:54.083 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 126 23:08:54.083 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 127 23:08:54.083 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111895, seq# expected = 3483111895 128 23:09:04.568 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111895 129 23:09:04.568 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 130 23:09:04.598 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 131 23:09:04.598 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 132 23:09:04.598 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111896, seq# expected = 3483111896 133 23:10:00.648 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111896 134 23:10:00.648 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 135 23:10:00.668 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 136 23:10:00.668 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 137 23:10:00.668 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111897, seq# expected = 3483111897 138 23:10:52.222 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111897 139 23:10:52.222 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 140 23:10:52.242 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 141 23:10:52.242 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 142 23:10:52.242 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111898, seq# expected = 3483111898 143 23:12:14.840 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 144 23:13:56.986 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111898 145 23:13:56.986 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 146 23:13:57.006 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 147 23:13:57.006 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 148 23:13:57.006 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111899, seq# expected = 3483111899 149 23:17:00.801 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111899 150 23:17:00.801 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 151 23:17:00.841 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 152 23:17:00.841 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 153 23:17:00.841 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111900, seq# expected = 3483111900 154 23:17:15.311 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 155 23:19:33.590 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111900 156 23:19:33.590 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 157 23:19:33.620 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 158 23:19:33.620 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 159 23:19:33.620 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111901, seq# expected = 3483111901 160 23:20:04.132 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111901 161 23:20:04.132 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 162 23:20:04.162 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 163 23:20:04.162 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 164 23:20:04.162 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111902, seq# expected = 3483111902 165 23:22:15.384 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 166 23:23:51.960 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111902 167 23:23:51.960 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 168 23:23:51.980 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 169 23:23:51.980 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 170 23:23:51.980 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111903, seq# expected = 3483111903 171 23:24:58.077 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111903 172 23:24:58.077 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 173 23:24:58.097 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 174 23:24:58.097 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 175 23:24:58.097 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111904, seq# expected = 3483111904 176 23:25:13.598 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111904 177 23:25:13.598 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 178 23:25:13.618 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 179 23:25:13.618 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 180 23:25:13.618 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111905, seq# expected = 3483111905 181 23:27:16.283 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 182 23:28:58.962 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111905 183 23:28:58.962 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 184 23:28:58.982 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 185 23:28:58.982 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 186 23:28:58.982 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111906, seq# expected = 3483111906 187 23:32:16.238 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 188 23:33:57.865 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111906 189 23:33:57.865 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 190 23:33:57.895 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 191 23:33:57.895 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 192 23:33:57.895 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111907, seq# expected = 3483111907 193 23:34:58.967 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111907 194 23:34:58.967 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 195 23:34:58.987 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 196 23:34:58.987 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 197 23:34:58.987 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111908, seq# expected = 3483111908 198 23:37:17.164 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 199 23:42:17.599 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 200 23:47:18.504 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 201 23:48:56.647 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111908 202 23:48:56.647 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 203 23:48:56.677 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 204 23:48:56.677 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 205 23:48:56.677 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111909, seq# expected = 3483111909 206 23:50:00.232 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111909 207 23:50:00.232 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 208 23:50:00.262 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 209 23:50:00.262 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 210 23:50:00.262 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111910, seq# expected = 3483111910 211 23:52:18.929 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 212 23:53:59.166 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111910 213 23:53:59.166 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 214 23:53:59.196 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 215 23:53:59.196 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 216 23:53:59.196 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111911, seq# expected = 3483111911 217 23:57:18.796 03/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 218 23:59:03.127 03/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111911 219 23:59:03.127 03/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 220 23:59:03.157 03/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 221 23:59:03.157 03/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 222 23:59:03.157 03/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111912, seq# expected = 3483111912 223 00:02:19.417 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 224 00:03:16.150 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111912 225 00:03:16.150 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 226 00:03:16.230 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 227 00:03:16.230 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 228 00:03:16.230 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111913, seq# expected = 3483111913 229 00:03:57.332 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111913 230 00:03:57.332 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 231 00:03:57.382 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 232 00:03:57.382 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 233 00:03:57.382 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111914, seq# expected = 3483111914 234 00:05:03.140 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111914 235 00:05:03.140 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 236 00:05:03.180 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 237 00:05:03.180 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 238 00:05:03.180 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111915, seq# expected = 3483111915 239 00:07:19.204 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 240 00:09:00.160 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111915 241 00:09:00.160 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 242 00:09:00.190 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 243 00:09:00.190 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 244 00:09:00.190 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111916, seq# expected = 3483111916 245 00:12:19.816 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 246 00:13:55.686 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111916 247 00:13:55.686 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 248 00:13:55.716 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 249 00:13:55.716 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 250 00:13:55.716 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111917, seq# expected = 3483111917 251 00:14:06.260 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111917 252 00:14:06.260 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 253 00:14:06.280 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 254 00:14:06.280 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 255 00:14:06.280 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111918, seq# expected = 3483111918 256 00:17:19.788 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 257 00:18:47.038 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111918 258 00:18:47.048 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 00:18:47.068 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 00:18:47.068 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 00:18:47.068 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111919, seq# expected = 3483111919 262 00:19:02.584 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111919 263 00:19:02.584 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 264 00:19:02.604 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 265 00:19:02.604 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 266 00:19:02.604 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111920, seq# expected = 3483111920 267 00:19:58.713 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111920 268 00:19:58.713 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 269 00:19:58.743 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 270 00:19:58.743 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 271 00:19:58.743 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111921, seq# expected = 3483111921 272 00:22:20.038 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 273 00:23:53.764 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111921 274 00:23:53.764 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 275 00:23:53.784 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 276 00:23:53.784 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 277 00:23:53.784 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111922, seq# expected = 3483111922 278 00:24:04.779 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111922 279 00:24:04.779 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 280 00:24:04.819 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 281 00:24:04.819 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 282 00:24:04.819 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111923, seq# expected = 3483111923 283 00:27:17.784 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111923 284 00:27:17.784 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 285 00:27:17.814 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 286 00:27:17.814 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 287 00:27:17.814 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111924, seq# expected = 3483111924 288 00:27:19.789 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 289 00:32:20.552 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 290 00:37:20.995 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 291 00:42:21.470 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 292 00:47:22.376 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 293 00:51:15.156 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111924 294 00:51:15.156 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 295 00:51:15.176 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 296 00:51:15.176 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 297 00:51:15.176 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111925, seq# expected = 3483111925 298 00:52:21.754 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 299 00:57:22.706 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 300 01:02:23.155 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 301 01:07:23.569 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 302 01:12:24.007 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 303 01:17:24.445 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 304 01:22:24.913 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 305 01:27:24.850 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 306 01:32:25.819 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 307 01:37:26.257 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 308 01:42:26.663 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 309 01:47:27.640 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 310 01:52:27.575 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 311 01:57:28.031 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 312 02:02:28.463 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 313 02:07:29.403 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 314 02:12:29.331 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 315 02:17:29.811 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 316 02:22:30.300 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 317 02:27:31.289 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 318 02:32:31.744 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 319 02:37:31.252 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 320 02:42:31.691 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 321 02:47:32.621 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 322 02:52:33.060 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 323 02:57:33.529 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 324 03:02:34.473 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 325 03:07:34.442 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 326 03:12:34.897 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 327 03:17:34.902 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 328 03:22:35.467 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 329 03:24:01.601 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111925 330 03:24:01.601 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 331 03:24:01.631 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 332 03:24:01.631 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 333 03:24:01.631 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111926, seq# expected = 3483111926 334 03:26:18.820 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111926 335 03:26:18.820 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 336 03:26:18.850 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 337 03:26:18.850 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 338 03:26:18.850 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111927, seq# expected = 3483111927 339 03:27:34.990 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 340 03:32:35.976 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 341 03:37:36.365 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 342 03:42:37.291 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 343 03:47:37.222 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 344 03:50:12.455 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111927 345 03:50:12.455 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 346 03:50:12.485 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 347 03:50:12.485 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 348 03:50:12.485 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111928, seq# expected = 3483111928 349 03:52:37.263 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 350 03:57:37.756 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 351 04:02:38.198 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 352 04:07:38.640 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 353 04:12:39.579 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 354 04:17:39.508 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 355 04:22:39.960 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 356 04:27:39.971 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 357 04:32:40.413 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 358 04:37:40.905 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 359 04:42:41.878 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 360 04:45:37.159 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111928 361 04:45:37.159 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 362 04:45:37.189 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 363 04:45:37.189 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 364 04:45:37.189 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111929, seq# expected = 3483111929 365 04:47:41.857 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 366 04:49:59.054 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111929 367 04:49:59.054 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 368 04:49:59.084 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 369 04:49:59.084 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 370 04:49:59.084 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111930, seq# expected = 3483111930 371 04:52:42.308 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 372 04:57:42.760 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 373 05:02:43.733 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 374 05:07:43.684 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 375 05:12:44.116 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 376 05:17:44.558 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 377 05:22:45.501 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 378 05:25:05.703 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111930 379 05:25:05.703 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 380 05:25:05.733 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 381 05:25:05.733 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 382 05:25:05.733 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111931, seq# expected = 3483111931 383 05:26:28.332 03/07/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x22bb9410 is about to expire, requesting a new one 384 05:26:28.332 03/07/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.68, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 385 05:26:28.332 03/07/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=34DB5BA3) Initiator = ID=10.13.8.68 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 386 05:26:28.342 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 387 05:26:28.372 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 388 05:26:28.372 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 389 05:26:28.372 03/07/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 390 05:26:28.372 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 391 05:26:28.372 03/07/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=34DB5BA3 OUTBOUND SPI = 0x6618E20C INBOUND SPI = 0x9B44B5F7) 392 05:26:28.372 03/07/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x6618E20C 393 05:26:28.372 03/07/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x9B44B5F7 394 05:26:28.372 03/07/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 395 05:26:28.842 03/07/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 396 05:26:28.842 03/07/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0ce21866 into key list 397 05:26:28.842 03/07/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 398 05:26:28.842 03/07/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf7b5449b into key list 399 05:26:58.365 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 400 05:26:58.365 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 401 05:26:58.365 03/07/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 1094BB22 INBOUND SPI = 1BD903EC) 402 05:26:58.365 03/07/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=E4F8C6AD 403 05:26:58.395 03/07/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xec03d91b 404 05:26:58.395 03/07/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xec03d91b 405 05:26:58.395 03/07/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x22bb9410 406 05:26:58.395 03/07/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x22bb9410 407 05:27:05.385 03/07/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x0ce21866 for inbound key with SPI=0xf7b5449b 408 05:27:44.942 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 409 05:32:45.894 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 410 05:37:46.326 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 411 05:42:46.278 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 412 05:47:15.144 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111931 413 05:47:15.144 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 414 05:47:15.174 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 415 05:47:15.174 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 416 05:47:15.174 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111932, seq# expected = 3483111932 417 05:47:47.190 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 418 05:50:01.383 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111932 419 05:50:01.383 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 420 05:50:01.413 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 421 05:50:01.413 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 422 05:50:01.413 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111933, seq# expected = 3483111933 423 05:50:47.950 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111933 424 05:50:47.960 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 425 05:50:47.980 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 426 05:50:47.980 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 427 05:50:47.980 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111934, seq# expected = 3483111934 428 05:52:00.054 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111934 429 05:52:00.054 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 430 05:52:00.084 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 431 05:52:00.084 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 432 05:52:00.084 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111935, seq# expected = 3483111935 433 05:52:47.128 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 434 05:52:51.123 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111935 435 05:52:51.123 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 436 05:52:51.153 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 437 05:52:51.153 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 438 05:52:51.153 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111936, seq# expected = 3483111936 439 05:57:48.034 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 440 05:57:53.532 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111936 441 05:57:53.532 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 442 05:57:53.552 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 443 05:57:53.552 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 444 05:57:53.552 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111937, seq# expected = 3483111937 445 05:59:59.708 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111937 446 05:59:59.708 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 447 05:59:59.738 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 448 05:59:59.738 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 449 05:59:59.738 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111938, seq# expected = 3483111938 450 06:00:10.223 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111938 451 06:00:10.223 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 452 06:00:10.253 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 453 06:00:10.253 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 454 06:00:10.253 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111939, seq# expected = 3483111939 455 06:02:06.886 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111939 456 06:02:06.886 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 457 06:02:06.916 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 458 06:02:06.916 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 459 06:02:06.916 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111940, seq# expected = 3483111940 460 06:02:47.944 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 461 06:02:52.951 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111940 462 06:02:52.951 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 463 06:02:52.971 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 464 06:02:52.971 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 465 06:02:52.971 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111941, seq# expected = 3483111941 466 06:04:59.127 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111941 467 06:04:59.127 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 468 06:04:59.157 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 469 06:04:59.157 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 470 06:04:59.157 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111942, seq# expected = 3483111942 471 06:07:48.374 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 472 06:07:50.867 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111942 473 06:07:50.867 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 474 06:07:50.897 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 475 06:07:50.897 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 476 06:07:50.897 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111943, seq# expected = 3483111943 477 06:08:01.382 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111943 478 06:08:01.382 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 06:08:01.412 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 480 06:08:01.412 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 481 06:08:01.412 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111944, seq# expected = 3483111944 482 06:12:48.794 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111944 483 06:12:48.794 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 484 06:12:48.824 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 485 06:12:48.824 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 486 06:12:48.824 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111945, seq# expected = 3483111945 487 06:14:09.907 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111945 488 06:14:09.907 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 489 06:14:09.927 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 490 06:14:09.927 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 491 06:14:09.927 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111946, seq# expected = 3483111946 492 06:17:49.714 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 493 06:17:56.734 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111946 494 06:17:56.734 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 495 06:17:56.754 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 496 06:17:56.754 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 497 06:17:56.754 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111947, seq# expected = 3483111947 498 06:22:48.642 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111947 499 06:22:48.642 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 500 06:22:48.672 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 501 06:22:48.672 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 502 06:22:48.672 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111948, seq# expected = 3483111948 503 06:22:50.144 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 504 06:22:59.147 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111948 505 06:22:59.147 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 506 06:22:59.177 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 507 06:22:59.177 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 508 06:22:59.177 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111949, seq# expected = 3483111949 509 06:26:12.417 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111949 510 06:26:12.417 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 511 06:26:12.437 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 512 06:26:12.437 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 513 06:26:12.437 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111950, seq# expected = 3483111950 514 06:27:48.551 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111950 515 06:27:48.551 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 516 06:27:48.581 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 517 06:27:48.581 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 518 06:27:48.581 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111951, seq# expected = 3483111951 519 06:27:50.554 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 520 06:29:42.210 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111951 521 06:29:42.210 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 522 06:29:42.230 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 523 06:29:42.230 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 524 06:29:42.230 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111952, seq# expected = 3483111952 525 06:32:50.974 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 526 06:32:57.483 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111952 527 06:32:57.483 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 528 06:32:57.513 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 529 06:32:57.513 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 530 06:32:57.513 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111953, seq# expected = 3483111953 531 06:37:48.390 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111953 532 06:37:48.390 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 533 06:37:48.420 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 534 06:37:48.420 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 535 06:37:48.420 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111954, seq# expected = 3483111954 536 06:37:50.894 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 537 06:37:58.905 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111954 538 06:37:58.905 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 539 06:37:58.935 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 540 06:37:58.935 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 541 06:37:58.935 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111955, seq# expected = 3483111955 542 06:38:09.419 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111955 543 06:38:09.419 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 544 06:38:09.439 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 545 06:38:09.439 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 546 06:38:09.439 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111956, seq# expected = 3483111956 547 06:42:51.334 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111956 548 06:42:51.334 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 549 06:42:51.334 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 550 06:42:51.364 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 551 06:42:51.364 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 552 06:42:51.364 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111957, seq# expected = 3483111957 553 06:47:52.244 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 554 06:47:53.746 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111957 555 06:47:53.746 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 556 06:47:53.776 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 557 06:47:53.776 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 558 06:47:53.776 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111958, seq# expected = 3483111958 559 06:49:59.923 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111958 560 06:49:59.923 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 561 06:49:59.953 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 562 06:49:59.953 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 563 06:49:59.953 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111959, seq# expected = 3483111959 564 06:52:52.664 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 565 06:52:52.664 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111959 566 06:52:52.664 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 567 06:52:52.694 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 568 06:52:52.694 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 569 06:52:52.694 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111960, seq# expected = 3483111960 570 06:53:03.179 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111960 571 06:53:03.179 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 572 06:53:03.209 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 573 06:53:03.209 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 574 06:53:03.209 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111961, seq# expected = 3483111961 575 06:57:53.094 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 576 06:57:57.090 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111961 577 06:57:57.090 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 578 06:57:57.110 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 579 06:57:57.110 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 580 06:57:57.110 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111962, seq# expected = 3483111962 581 07:02:48.007 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111962 582 07:02:48.007 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 583 07:02:48.027 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 584 07:02:48.037 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 585 07:02:48.037 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111963, seq# expected = 3483111963 586 07:02:53.004 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 587 07:05:00.682 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111963 588 07:05:00.682 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 589 07:05:00.712 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 590 07:05:00.712 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 591 07:05:00.712 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111964, seq# expected = 3483111964 592 07:07:53.424 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 593 07:08:03.438 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111964 594 07:08:03.438 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 595 07:08:03.458 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 596 07:08:03.458 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 597 07:08:03.458 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111965, seq# expected = 3483111965 598 07:08:24.978 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111965 599 07:08:24.978 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 600 07:08:24.998 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 601 07:08:24.998 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 602 07:08:24.998 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111966, seq# expected = 3483111966 603 07:12:53.844 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 604 07:12:57.849 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111966 605 07:12:57.849 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 606 07:12:57.869 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 607 07:12:57.869 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 608 07:12:57.869 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111967, seq# expected = 3483111967 609 07:14:08.949 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111967 610 07:14:08.949 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 611 07:14:08.979 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 612 07:14:08.979 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 613 07:14:08.979 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111968, seq# expected = 3483111968 614 07:14:50.006 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111968 615 07:14:50.006 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 616 07:14:50.036 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 617 07:14:50.036 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 618 07:14:50.036 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111969, seq# expected = 3483111969 619 07:17:51.269 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111969 620 07:17:51.269 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 621 07:17:51.299 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 622 07:17:51.299 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 623 07:17:51.299 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111970, seq# expected = 3483111970 624 07:17:54.274 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 625 07:22:54.704 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111970 626 07:22:54.704 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 627 07:22:54.724 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 628 07:22:54.724 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 629 07:22:54.724 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111971, seq# expected = 3483111971 630 07:22:54.724 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 631 07:26:05.981 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111971 632 07:26:05.981 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 633 07:26:06.001 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 634 07:26:06.001 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 635 07:26:06.001 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111972, seq# expected = 3483111972 636 07:27:55.134 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 637 07:27:57.126 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111972 638 07:27:57.126 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 639 07:27:57.146 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 640 07:27:57.156 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 641 07:27:57.156 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111973, seq# expected = 3483111973 642 07:32:49.535 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111973 643 07:32:49.535 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 644 07:32:49.565 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 645 07:32:49.565 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 646 07:32:49.565 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111974, seq# expected = 3483111974 647 07:32:55.544 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 648 07:33:00.050 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111974 649 07:33:00.060 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 650 07:33:00.080 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 651 07:33:00.080 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 652 07:33:00.080 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111975, seq# expected = 3483111975 653 07:34:57.214 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111975 654 07:34:57.214 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 655 07:34:57.244 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 656 07:34:57.244 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 657 07:34:57.244 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111976, seq# expected = 3483111976 658 07:37:54.471 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111976 659 07:37:54.471 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 660 07:37:54.492 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 661 07:37:54.492 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 662 07:37:54.492 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111977, seq# expected = 3483111977 663 07:37:56.464 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 664 07:38:04.976 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111977 665 07:38:04.976 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 666 07:38:05.006 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 667 07:38:05.006 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 668 07:38:05.006 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111978, seq# expected = 3483111978 669 07:42:49.374 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111978 670 07:42:49.374 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 671 07:42:49.404 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 672 07:42:49.404 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 673 07:42:49.404 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111979, seq# expected = 3483111979 674 07:42:56.884 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 675 07:42:59.888 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111979 676 07:42:59.888 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 677 07:42:59.919 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 678 07:42:59.919 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 679 07:42:59.919 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111980, seq# expected = 3483111980 680 07:47:54.300 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111980 681 07:47:54.300 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 682 07:47:54.340 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 683 07:47:54.340 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 684 07:47:54.340 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111981, seq# expected = 3483111981 685 07:47:56.804 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 686 07:49:57.482 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111981 687 07:49:57.482 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 688 07:49:57.502 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 689 07:49:57.502 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 690 07:49:57.502 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111982, seq# expected = 3483111982 691 07:50:08.488 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111982 692 07:50:08.488 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 693 07:50:08.518 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 694 07:50:08.518 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 695 07:50:08.518 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111983, seq# expected = 3483111983 696 07:52:49.212 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111983 697 07:52:49.212 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 698 07:52:49.232 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 699 07:52:49.232 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 700 07:52:49.232 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111984, seq# expected = 3483111984 701 07:52:57.224 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 702 07:52:59.727 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111984 703 07:52:59.727 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 704 07:52:59.757 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 705 07:52:59.757 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 706 07:52:59.757 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111985, seq# expected = 3483111985 707 07:57:49.142 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111985 708 07:57:49.142 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 709 07:57:49.172 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 710 07:57:49.172 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 711 07:57:49.172 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111986, seq# expected = 3483111986 712 07:57:57.644 03/07/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1586, dst port 4005 713 07:58:09.660 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111986 714 07:58:09.660 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 715 07:58:09.680 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 716 07:58:09.680 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 717 07:58:09.680 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111987, seq# expected = 3483111987 718 07:59:11.256 03/07/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3483111987 719 07:59:11.256 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 720 07:59:11.287 03/07/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 721 07:59:11.287 03/07/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 722 07:59:11.287 03/07/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3483111988, seq# expected = 3483111988 723 08:00:19.812 03/07/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 724 08:00:19.812 03/07/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 725 08:00:19.812 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 726 08:00:19.812 03/07/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 6618E20C INBOUND SPI = 9B44B5F7) 727 08:00:19.812 03/07/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=34DB5BA3 728 08:00:19.812 03/07/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=ED3087EF9D063916 R_Cookie=A294F8A16767BD12) reason = DEL_REASON_RESET_SADB 729 08:00:19.812 03/07/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 730 08:00:19.812 03/07/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=ED3087EF9D063916 R_Cookie=A294F8A16767BD12) reason = DEL_REASON_RESET_SADB 731 08:00:19.812 03/07/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 732 08:00:19.812 03/07/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 733 08:00:19.812 03/07/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 734 08:00:19.812 03/07/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1586 for TCP connection. 735 08:00:19.812 03/07/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 8:57:50 736 08:00:19.822 03/07/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 737 08:00:21.374 03/07/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 738 08:00:21.384 03/07/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 739 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf7b5449b 740 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf7b5449b 741 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x0ce21866 742 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x0ce21866 743 08:00:21.394 03/07/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1586, dst port 4005 744 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 745 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 746 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 747 08:00:21.394 03/07/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys