EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 18:14:38.387 03/28/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 18:14:38.527 03/28/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 18:14:38.527 03/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 18:14:38.567 03/28/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1079 for TCP connection. 5 18:14:38.697 03/28/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 18:14:38.697 03/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 18:14:38.697 03/28/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1079, dst port 4005 8 18:14:38.697 03/28/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1079 9 18:14:38.697 03/28/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1079, dst port 4005 10 18:14:38.697 03/28/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 18:14:39.198 03/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 18:14:39.238 03/28/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 18:14:39.268 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 18:14:39.438 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 18:14:39.438 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 18:14:39.438 03/28/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 18:14:39.438 03/28/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 18:14:39.438 03/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 18:14:39.438 03/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 18:14:39.468 03/28/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 18:14:39.468 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 18:14:39.468 03/28/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 18:14:39.468 03/28/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 18:14:39.498 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 18:14:39.498 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 18:14:39.498 03/28/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 18:14:39.498 03/28/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E5993592A51F2BF8 R_Cookie=2DF2410EAF667255) reason = DEL_REASON_LOAD_BALANCING 28 18:14:39.508 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 18:14:40.199 03/28/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E5993592A51F2BF8 R_Cookie=2DF2410EAF667255) reason = DEL_REASON_LOAD_BALANCING 30 18:14:40.199 03/28/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 18:14:40.199 03/28/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 18:14:40.199 03/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 18:14:40.209 03/28/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 18:14:40.700 03/28/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1079, dst port 4005 35 18:14:40.700 03/28/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1079, dst port 4005 36 18:14:40.700 03/28/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1079 37 18:14:40.700 03/28/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1079, dst port 4005 38 18:14:40.700 03/28/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 18:14:41.201 03/28/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 18:14:41.201 03/28/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 18:14:41.211 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 18:14:41.391 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 18:14:41.391 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 18:14:41.391 03/28/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 18:14:41.391 03/28/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 18:14:41.391 03/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 18:14:41.391 03/28/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 18:14:41.401 03/28/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 18:14:41.401 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 18:14:41.401 03/28/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 18:14:41.401 03/28/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 18:14:41.451 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 18:14:41.451 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 18:14:41.451 03/28/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 18:14:52.357 03/28/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 18:14:52.357 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 18:14:54.830 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 18:14:54.830 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 18:14:54.830 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 18:14:54.830 03/28/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 18:14:54.910 03/28/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 18:14:54.920 03/28/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 18:14:54.920 03/28/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 18:14:54.920 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 18:14:55.792 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.206 68 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 18:14:55.792 03/28/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 18:14:55.922 03/28/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 18:14:55.942 03/28/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.206, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 18:14:55.942 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 18:14:55.942 03/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 18:14:55.942 03/28/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 18:14:55.982 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 18:14:55.982 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 18:14:55.982 03/28/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 18:14:55.982 03/28/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 14 seconds, setting expiry to 86386 seconds from now 89 18:14:55.982 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 18:14:55.992 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 18:14:55.992 03/28/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 18:14:55.992 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 18:14:55.992 03/28/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=F67420F8 OUTBOUND SPI = 0x15BB2F7A INBOUND SPI = 0xA09FB0FF) 94 18:14:55.992 03/28/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x15BB2F7A 95 18:14:55.992 03/28/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xA09FB0FF 96 18:14:58.886 03/28/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.206/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 18:14:58.966 03/28/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 18:14:59.026 03/28/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 18:14:59.046 03/28/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.100. Current address(es): 192.168.1.100, 10.13.8.206, 192.168.5.1. 100 18:14:59.046 03/28/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.206. Current address(es): 192.168.1.100, 10.13.8.206, 192.168.5.1. 101 18:14:59.367 03/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 18:14:59.367 03/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7a2fbb15 into key list 103 18:14:59.367 03/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 18:14:59.367 03/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xffb09fa0 into key list 105 18:14:59.367 03/28/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.206 106 18:15:03.733 03/28/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x7a2fbb15 for inbound key with SPI=0xffb09fa0 107 18:17:40.541 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509182 108 18:17:40.541 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 18:17:40.571 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 18:17:40.571 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 18:17:40.571 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509183, seq# expected = 2772509183 112 18:19:41.784 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 113 18:23:35.149 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509183 114 18:23:35.149 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 115 18:23:35.179 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 116 18:23:35.179 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 117 18:23:35.179 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509184, seq# expected = 2772509184 118 18:24:41.795 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 119 18:29:42.277 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 120 18:34:43.209 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 121 18:37:42.968 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509184 122 18:37:42.968 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 123 18:37:42.998 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 124 18:37:42.998 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 125 18:37:42.998 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509185, seq# expected = 2772509185 126 18:39:43.141 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 127 18:43:33.973 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509185 128 18:43:33.973 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 129 18:43:34.003 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 130 18:43:34.003 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 131 18:43:34.003 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509186, seq# expected = 2772509186 132 18:44:43.573 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 133 18:49:44.503 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 134 18:54:44.609 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 135 18:59:44.990 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 136 19:04:44.870 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 137 19:07:42.146 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509186 138 19:07:42.146 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 139 19:07:42.186 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 140 19:07:42.186 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 141 19:07:42.186 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509187, seq# expected = 2772509187 142 19:09:44.896 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 143 19:14:45.408 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 144 19:17:43.677 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509187 145 19:17:43.677 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 146 19:17:43.707 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 147 19:17:43.707 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 148 19:17:43.707 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509188, seq# expected = 2772509188 149 19:19:39.351 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509188 150 19:19:39.351 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 151 19:19:39.381 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 152 19:19:39.381 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 153 19:19:39.381 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509189, seq# expected = 2772509189 154 19:19:45.360 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 155 19:24:45.796 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 156 19:29:46.206 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 157 19:31:35.864 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509189 158 19:31:35.864 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 159 19:31:35.894 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 160 19:31:35.894 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 161 19:31:35.894 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509190, seq# expected = 2772509190 162 19:32:41.459 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509190 163 19:32:41.459 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 164 19:32:41.489 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 165 19:32:41.489 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 166 19:32:41.489 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509191, seq# expected = 2772509191 167 19:34:47.141 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 168 19:39:47.076 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 169 19:43:32.902 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509191 170 19:43:32.902 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 171 19:43:32.933 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 172 19:43:32.933 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 173 19:43:32.933 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509192, seq# expected = 2772509192 174 19:44:47.511 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 175 19:47:43.806 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509192 176 19:47:43.806 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 177 19:47:43.836 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 178 19:47:43.836 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 179 19:47:43.836 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509193, seq# expected = 2772509193 180 19:49:48.486 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 181 19:54:48.921 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 182 19:59:49.333 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 183 20:04:49.227 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 184 20:07:16.380 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509193 185 20:07:16.380 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 186 20:07:16.410 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 187 20:07:16.410 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 188 20:07:16.410 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509194, seq# expected = 2772509194 189 20:09:50.092 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 190 20:14:50.508 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 191 20:17:42.787 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509194 192 20:17:42.787 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 193 20:17:42.817 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 194 20:17:42.817 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 195 20:17:42.817 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509195, seq# expected = 2772509195 196 20:19:18.442 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509195 197 20:19:18.442 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 198 20:19:18.472 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 199 20:19:18.472 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 200 20:19:18.472 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509196, seq# expected = 2772509196 201 20:19:50.492 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 202 20:24:51.424 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 203 20:29:51.356 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 204 20:31:14.976 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509196 205 20:31:14.976 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 20:31:15.006 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 20:31:15.006 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 20:31:15.006 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509197, seq# expected = 2772509197 209 20:32:40.598 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509197 210 20:32:40.598 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 211 20:32:40.628 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 212 20:32:40.628 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 213 20:32:40.628 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509198, seq# expected = 2772509198 214 20:34:51.783 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 215 20:36:26.416 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509198 216 20:36:26.416 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 217 20:36:26.446 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 218 20:36:26.446 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 219 20:36:26.446 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509199, seq# expected = 2772509199 220 20:37:11.980 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509199 221 20:37:11.980 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 222 20:37:12.010 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 223 20:37:12.010 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 224 20:37:12.010 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509200, seq# expected = 2772509200 225 20:38:03.053 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509200 226 20:38:03.053 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 227 20:38:03.083 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 228 20:38:03.083 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 229 20:38:03.083 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509201, seq# expected = 2772509201 230 20:39:52.209 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 231 20:41:43.869 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509201 232 20:41:43.869 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 233 20:41:43.899 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 234 20:41:43.899 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 235 20:41:43.899 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509202, seq# expected = 2772509202 236 20:42:24.426 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509202 237 20:42:24.426 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 238 20:42:24.456 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 239 20:42:24.456 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 240 20:42:24.456 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509203, seq# expected = 2772509203 241 20:43:20.507 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509203 242 20:43:20.507 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 243 20:43:20.547 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 244 20:43:20.547 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 245 20:43:20.547 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509204, seq# expected = 2772509204 246 20:44:52.638 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 247 20:47:01.823 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509204 248 20:47:01.823 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 249 20:47:01.853 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 250 20:47:01.853 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 251 20:47:01.853 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509205, seq# expected = 2772509205 252 20:47:42.380 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509205 253 20:47:42.380 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 254 20:47:42.421 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 255 20:47:42.421 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 256 20:47:42.421 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509206, seq# expected = 2772509206 257 20:49:53.568 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 258 20:52:14.269 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509206 259 20:52:14.269 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 260 20:52:14.299 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 261 20:52:14.299 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 262 20:52:14.299 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509207, seq# expected = 2772509207 263 20:54:35.470 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509207 264 20:54:35.470 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 265 20:54:35.500 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 266 20:54:35.500 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 267 20:54:35.500 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509208, seq# expected = 2772509208 268 20:54:53.496 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 269 20:55:16.028 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509208 270 20:55:16.028 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 271 20:55:16.058 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 272 20:55:16.058 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 273 20:55:16.058 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509209, seq# expected = 2772509209 274 20:59:37.401 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509209 275 20:59:37.401 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 276 20:59:42.409 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509210 277 20:59:42.409 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 278 20:59:42.439 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 279 20:59:42.439 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 280 20:59:42.439 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509211, seq# expected = 2772509211 281 20:59:53.925 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 282 21:01:58.102 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509211 283 21:01:58.102 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 284 21:01:58.132 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 285 21:01:58.132 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 286 21:01:58.132 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509212, seq# expected = 2772509212 287 21:02:08.617 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509212 288 21:02:08.617 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 289 21:02:08.647 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 290 21:02:08.647 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 291 21:02:08.647 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509213, seq# expected = 2772509213 292 21:02:39.662 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509213 293 21:02:39.662 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 294 21:02:39.712 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 295 21:02:39.712 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 296 21:02:39.712 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509214, seq# expected = 2772509214 297 21:04:36.328 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509214 298 21:04:36.328 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 299 21:04:36.358 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 300 21:04:36.358 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 301 21:04:36.358 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509215, seq# expected = 2772509215 302 21:04:54.354 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 303 21:07:17.564 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509215 304 21:07:17.564 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 305 21:07:17.594 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 306 21:07:17.594 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 307 21:07:17.594 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509216, seq# expected = 2772509216 308 21:09:38.276 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509216 309 21:09:38.276 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 310 21:09:38.306 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 311 21:09:38.306 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 312 21:09:38.306 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509217, seq# expected = 2772509217 313 21:09:54.801 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 314 21:14:40.727 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509217 315 21:14:40.727 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 316 21:14:40.757 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 317 21:14:40.757 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 318 21:14:40.757 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509218, seq# expected = 2772509218 319 21:14:55.258 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 320 21:19:19.628 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509218 321 21:19:19.628 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 322 21:19:19.659 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 323 21:19:19.659 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 324 21:19:19.659 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509219, seq# expected = 2772509219 325 21:19:35.151 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509219 326 21:19:35.151 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 327 21:19:35.181 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 328 21:19:35.181 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 329 21:19:35.181 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509220, seq# expected = 2772509220 330 21:19:55.680 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 331 21:24:42.593 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509220 332 21:24:42.593 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 333 21:24:42.623 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 334 21:24:42.623 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 335 21:24:42.623 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509221, seq# expected = 2772509221 336 21:24:56.112 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 337 21:29:35.013 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509221 338 21:29:35.013 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 339 21:29:35.053 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 340 21:29:35.053 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 341 21:29:35.053 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509222, seq# expected = 2772509222 342 21:29:56.554 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 343 21:32:42.283 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509222 344 21:32:42.283 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 345 21:32:42.313 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 346 21:32:42.313 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 347 21:32:42.313 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509223, seq# expected = 2772509223 348 21:34:34.945 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509223 349 21:34:34.945 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 350 21:34:34.975 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 351 21:34:34.975 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 352 21:34:34.975 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509224, seq# expected = 2772509224 353 21:34:56.986 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 354 21:39:36.378 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509224 355 21:39:36.378 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 356 21:39:36.418 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 357 21:39:36.418 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 358 21:39:36.418 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509225, seq# expected = 2772509225 359 21:39:57.418 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 360 21:43:18.197 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509225 361 21:43:18.197 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 362 21:43:18.227 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 363 21:43:18.227 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 364 21:43:18.227 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509226, seq# expected = 2772509226 365 21:44:38.823 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509226 366 21:44:38.823 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 367 21:44:38.853 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 368 21:44:38.853 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 369 21:44:38.853 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509227, seq# expected = 2772509227 370 21:44:57.850 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 371 21:47:41.586 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509227 372 21:47:41.586 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 373 21:47:41.626 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 374 21:47:41.626 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 375 21:47:41.626 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509228, seq# expected = 2772509228 376 21:49:42.760 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509228 377 21:49:42.760 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 378 21:49:42.790 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 379 21:49:42.800 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 380 21:49:42.800 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509229, seq# expected = 2772509229 381 21:49:58.783 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 382 21:54:09.143 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509229 383 21:54:09.143 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 384 21:54:09.173 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 385 21:54:09.173 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 386 21:54:09.173 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509230, seq# expected = 2772509230 387 21:54:58.714 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 388 21:59:37.625 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509230 389 21:59:37.625 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 390 21:59:37.706 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 391 21:59:37.706 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 392 21:59:37.706 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509231, seq# expected = 2772509231 393 21:59:59.156 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 394 22:02:40.388 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509231 395 22:02:40.388 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 396 22:02:40.418 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 397 22:02:40.418 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 398 22:02:40.418 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509232, seq# expected = 2772509232 399 22:04:36.055 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509232 400 22:04:36.055 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 401 22:04:36.085 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 402 22:04:36.085 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 403 22:04:36.085 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509233, seq# expected = 2772509233 404 22:04:59.588 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 405 22:07:11.778 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509233 406 22:07:11.778 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 407 22:07:11.808 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 408 22:07:11.808 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 409 22:07:11.808 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509234, seq# expected = 2772509234 410 22:09:38.489 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509234 411 22:09:38.489 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 412 22:09:38.519 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 413 22:09:38.519 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 414 22:09:38.519 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509235, seq# expected = 2772509235 415 22:10:00.020 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 416 22:14:40.423 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509235 417 22:14:40.423 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 418 22:14:40.453 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 419 22:14:40.453 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 420 22:14:40.463 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509236, seq# expected = 2772509236 421 22:15:00.451 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 422 22:17:41.177 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509236 423 22:17:41.177 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 424 22:17:41.207 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 425 22:17:41.207 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 426 22:17:41.207 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509237, seq# expected = 2772509237 427 22:19:17.813 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509237 428 22:19:17.813 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 429 22:19:17.843 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 430 22:19:17.843 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 431 22:19:17.843 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509238, seq# expected = 2772509238 432 22:20:00.875 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 433 22:24:34.769 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509238 434 22:24:34.769 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 435 22:24:34.799 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 436 22:24:34.799 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 437 22:24:34.799 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509239, seq# expected = 2772509239 438 22:25:01.307 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 439 22:30:01.739 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 440 22:30:06.747 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509239 441 22:30:06.747 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 442 22:30:06.777 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 443 22:30:06.777 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 444 22:30:06.777 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509240, seq# expected = 2772509240 445 22:31:17.348 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509240 446 22:31:17.348 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 447 22:31:17.378 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 448 22:31:17.378 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 449 22:31:17.378 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509241, seq# expected = 2772509241 450 22:32:43.472 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509241 451 22:32:43.472 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 452 22:32:43.512 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 453 22:32:43.512 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 454 22:32:43.512 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509242, seq# expected = 2772509242 455 22:34:34.642 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509242 456 22:34:34.642 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 457 22:34:34.672 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 458 22:34:34.672 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 459 22:34:34.672 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509243, seq# expected = 2772509243 460 22:34:45.157 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509243 461 22:34:45.157 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 462 22:34:45.187 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 463 22:34:45.187 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 464 22:34:45.187 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509244, seq# expected = 2772509244 465 22:35:02.181 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 466 22:37:31.897 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509244 467 22:37:31.897 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 468 22:37:31.927 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 469 22:37:31.927 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 470 22:37:31.927 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509245, seq# expected = 2772509245 471 22:40:03.665 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 472 22:43:16.943 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509245 473 22:43:16.943 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 474 22:43:16.973 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 475 22:43:16.973 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 476 22:43:16.973 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509246, seq# expected = 2772509246 477 22:44:43.067 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509246 478 22:44:43.067 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 22:44:43.097 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 480 22:44:43.097 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 481 22:44:43.097 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509247, seq# expected = 2772509247 482 22:45:03.095 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 483 22:47:40.822 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509247 484 22:47:40.822 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 485 22:47:40.852 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 486 22:47:40.852 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 487 22:47:40.852 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509248, seq# expected = 2772509248 488 22:50:03.536 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 489 22:53:45.307 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509248 490 22:53:45.307 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 491 22:53:45.337 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 492 22:53:45.337 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 493 22:53:45.337 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509249, seq# expected = 2772509249 494 22:55:04.428 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 495 22:56:06.004 03/28/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1079, flags 10h 496 22:56:21.525 03/28/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1079, flags 10h 497 22:59:35.817 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509249 498 22:59:35.827 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 499 22:59:35.857 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 500 22:59:35.857 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 501 22:59:35.857 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509250, seq# expected = 2772509250 502 23:00:04.868 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 503 23:04:33.744 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509250 504 23:04:33.754 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 505 23:04:33.774 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 506 23:04:33.774 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 507 23:04:33.784 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509251, seq# expected = 2772509251 508 23:05:04.797 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 509 23:10:05.217 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 510 23:15:05.647 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 511 23:19:36.025 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509251 512 23:19:36.025 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 513 23:19:36.055 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 514 23:19:36.055 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 515 23:19:36.055 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509252, seq# expected = 2772509252 516 23:20:06.067 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 517 23:23:08.337 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509252 518 23:23:08.337 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 519 23:23:08.367 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 520 23:23:08.367 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 521 23:23:08.367 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509253, seq# expected = 2772509253 522 23:25:06.543 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 523 23:30:08.023 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 524 23:32:33.735 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509253 525 23:32:33.735 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 526 23:32:33.765 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 527 23:32:33.765 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 528 23:32:33.765 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509254, seq# expected = 2772509254 529 23:35:07.459 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 530 23:40:08.398 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 531 23:41:12.492 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509254 532 23:41:12.492 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 533 23:41:12.522 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 534 23:41:12.522 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 535 23:41:12.522 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509255, seq# expected = 2772509255 536 23:45:07.835 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509255 537 23:45:07.835 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 538 23:45:07.865 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 539 23:45:07.865 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 540 23:45:07.865 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509256, seq# expected = 2772509256 541 23:45:08.335 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 542 23:49:40.733 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509256 543 23:49:40.733 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 544 23:49:40.763 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 545 23:49:40.763 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 546 23:49:40.763 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509257, seq# expected = 2772509257 547 23:50:08.783 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 548 23:52:12.464 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509257 549 23:52:12.464 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 550 23:52:17.471 03/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509258 551 23:52:17.471 03/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 552 23:52:17.501 03/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 553 23:52:17.501 03/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 554 23:52:17.501 03/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509259, seq# expected = 2772509259 555 23:55:09.252 03/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 556 00:00:09.700 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 557 00:05:10.128 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 558 00:10:11.597 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 559 00:15:11.044 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 560 00:20:11.982 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 561 00:25:11.930 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 562 00:30:12.868 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 563 00:34:35.184 03/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2772509259 564 00:34:35.184 03/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 565 00:34:35.214 03/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 566 00:34:35.214 03/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 567 00:34:35.214 03/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2772509260, seq# expected = 2772509260 568 00:35:12.727 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 569 00:38:55.554 03/29/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x7a2fbb15 is about to expire, requesting a new one 570 00:38:55.554 03/29/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.206, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 571 00:38:55.554 03/29/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=795B7C80) Initiator = ID=10.13.8.206 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 572 00:38:55.564 03/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 573 00:38:55.604 03/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 574 00:38:55.604 03/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 575 00:38:55.604 03/29/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 576 00:38:55.604 03/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 577 00:38:55.604 03/29/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=795B7C80 OUTBOUND SPI = 0x23FA3298 INBOUND SPI = 0x12AFF318) 578 00:38:55.604 03/29/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x23FA3298 579 00:38:55.604 03/29/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x12AFF318 580 00:38:55.604 03/29/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 581 00:38:56.075 03/29/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 582 00:38:56.075 03/29/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9832fa23 into key list 583 00:38:56.075 03/29/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 584 00:38:56.075 03/29/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x18f3af12 into key list 585 00:39:25.596 03/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 586 00:39:25.596 03/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 587 00:39:25.606 03/29/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 15BB2F7A INBOUND SPI = A09FB0FF) 588 00:39:25.606 03/29/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=F67420F8 589 00:39:25.606 03/29/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xffb09fa0 590 00:39:25.606 03/29/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xffb09fa0 591 00:39:25.606 03/29/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7a2fbb15 592 00:39:25.606 03/29/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7a2fbb15 593 00:39:28.100 03/29/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x9832fa23 for inbound key with SPI=0x18f3af12 594 00:40:13.173 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 595 00:45:14.137 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 596 00:50:14.079 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 597 00:55:14.512 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 598 01:00:15.456 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 599 01:05:16.390 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 600 01:10:15.851 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 601 01:15:16.284 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 602 01:20:17.218 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 603 01:25:17.140 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 604 01:30:18.064 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 605 01:35:18.988 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 606 01:40:18.981 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 607 01:45:18.563 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 608 01:50:19.058 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 609 01:55:19.013 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 610 02:00:19.598 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 611 02:05:20.063 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 612 02:10:20.067 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 613 02:15:20.142 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 614 02:20:21.118 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 615 02:25:21.072 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 616 02:30:22.268 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 617 02:35:21.812 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 618 02:40:21.816 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 619 02:45:22.391 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 620 02:50:21.915 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 621 02:55:21.877 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 622 03:00:22.414 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 623 03:05:22.960 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 624 03:10:21.994 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 625 03:15:22.029 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 626 03:20:22.615 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 627 03:25:22.571 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 628 03:30:23.017 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 629 03:35:23.944 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 630 03:40:23.909 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 631 03:45:24.846 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 632 03:50:25.302 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 633 03:55:25.257 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 634 04:00:26.234 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 635 04:05:27.221 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 636 04:10:26.645 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 637 04:15:27.632 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 638 04:20:28.579 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 639 04:25:28.955 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 640 04:30:29.411 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 641 04:35:29.336 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 642 04:40:29.772 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 643 04:45:29.727 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 644 04:50:30.644 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 645 04:55:30.599 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 646 05:00:31.526 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 647 05:05:31.992 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 648 05:10:32.478 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 649 05:15:32.914 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 650 05:20:32.860 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 651 05:25:33.306 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 652 05:30:34.753 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 653 05:35:34.678 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 654 05:40:34.634 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 655 05:45:35.570 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 656 05:50:36.497 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 657 05:55:36.432 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 658 06:00:36.888 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 659 06:05:37.334 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 660 06:10:37.250 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 661 06:15:37.696 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 662 06:20:38.142 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 663 06:25:39.088 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 664 06:30:40.005 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 665 06:35:39.430 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 666 06:40:40.356 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 667 06:45:40.312 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 668 06:50:41.739 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 669 06:55:41.695 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 670 07:00:42.201 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 671 07:02:57.382 03/29/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x9832fa23 is about to expire, requesting a new one 672 07:02:57.382 03/29/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.206, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 673 07:02:57.382 03/29/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=FB7C0F55) Initiator = ID=10.13.8.206 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 674 07:02:57.382 03/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 675 07:02:57.422 03/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 676 07:02:57.422 03/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 677 07:02:57.422 03/29/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 678 07:02:57.422 03/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 679 07:02:57.422 03/29/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=FB7C0F55 OUTBOUND SPI = 0x676B02DE INBOUND SPI = 0xA9D087F7) 680 07:02:57.422 03/29/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x676B02DE 681 07:02:57.422 03/29/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xA9D087F7 682 07:02:57.422 03/29/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 683 07:02:57.883 03/29/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 684 07:02:57.883 03/29/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xde026b67 into key list 685 07:02:57.883 03/29/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 686 07:02:57.883 03/29/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf787d0a9 into key list 687 07:03:27.415 03/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 688 07:03:27.415 03/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 689 07:03:27.415 03/29/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 23FA3298 INBOUND SPI = 12AFF318) 690 07:03:27.415 03/29/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=795B7C80 691 07:03:27.445 03/29/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x18f3af12 692 07:03:27.445 03/29/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x18f3af12 693 07:03:27.445 03/29/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9832fa23 694 07:03:27.445 03/29/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9832fa23 695 07:03:31.431 03/29/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xde026b67 for inbound key with SPI=0xf787d0a9 696 07:05:42.627 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 697 07:10:43.073 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 698 07:15:42.998 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 699 07:20:43.995 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 700 07:25:44.922 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 701 07:30:44.346 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 702 07:35:44.822 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 703 07:40:45.759 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 704 07:45:45.694 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 705 07:50:46.651 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 706 07:55:47.077 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 707 08:00:47.052 03/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1079, dst port 4005 708 08:05:24.416 03/29/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 709 08:05:24.416 03/29/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 710 08:05:24.416 03/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 711 08:05:24.416 03/29/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 676B02DE INBOUND SPI = A9D087F7) 712 08:05:24.416 03/29/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=FB7C0F55 713 08:05:24.416 03/29/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=5FB2842C229BDD96 R_Cookie=C00FDFBFA0F87567) reason = DEL_REASON_RESET_SADB 714 08:05:24.416 03/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 715 08:05:24.416 03/29/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=5FB2842C229BDD96 R_Cookie=C00FDFBFA0F87567) reason = DEL_REASON_RESET_SADB 716 08:05:24.416 03/29/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 717 08:05:24.416 03/29/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 718 08:05:24.636 03/29/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 719 08:05:24.646 03/29/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1079 for TCP connection. 720 08:05:24.646 03/29/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 13:50:25 721 08:05:25.277 03/29/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 722 08:05:33.758 03/29/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 723 08:05:33.799 03/29/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 724 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf787d0a9 725 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf787d0a9 726 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xde026b67 727 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xde026b67 728 08:05:33.819 03/29/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1079, dst port 4005 729 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 730 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 731 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 732 08:05:33.819 03/29/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys