EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 20:06:21.048 04/05/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 20:06:21.058 04/05/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 20:06:21.058 04/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 20:06:21.068 04/05/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 3286 for TCP connection. 5 20:06:21.288 04/05/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 20:06:21.288 04/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 20:06:21.288 04/05/07 Sev=Info/6 IPSEC/0x6370002B Sent 1 packets, 0 were fragmented. 8 20:06:21.288 04/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 3286, dst port 4005 9 20:06:21.288 04/05/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 3286 10 20:06:21.288 04/05/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 3286, dst port 4005 11 20:06:21.288 04/05/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 20:06:21.789 04/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 20:06:21.799 04/05/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 20:06:21.829 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 20:06:22.009 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 20:06:22.009 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 20:06:22.009 04/05/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 20:06:22.009 04/05/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 20:06:22.009 04/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 20:06:22.009 04/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 20:06:22.019 04/05/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 20:06:22.019 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 20:06:22.019 04/05/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 20:06:22.019 04/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 20:06:22.049 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 20:06:22.049 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 20:06:22.049 04/05/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 28 20:06:22.049 04/05/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A83F34BB8A8FE796 R_Cookie=CD2CED4ECFA3B6E5) reason = DEL_REASON_LOAD_BALANCING 29 20:06:22.049 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 20:06:22.790 04/05/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A83F34BB8A8FE796 R_Cookie=CD2CED4ECFA3B6E5) reason = DEL_REASON_LOAD_BALANCING 31 20:06:22.790 04/05/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 20:06:22.790 04/05/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 33 20:06:22.790 04/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 34 20:06:22.811 04/05/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 20:06:23.301 04/05/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 3286, dst port 4005 36 20:06:23.301 04/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 3286, dst port 4005 37 20:06:23.301 04/05/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 3286 38 20:06:23.301 04/05/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 3286, dst port 4005 39 20:06:23.301 04/05/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 40 20:06:23.802 04/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 41 20:06:23.822 04/05/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 42 20:06:23.852 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 43 20:06:24.022 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 44 20:06:24.022 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 45 20:06:24.022 04/05/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 20:06:24.022 04/05/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 20:06:24.022 04/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 20:06:24.022 04/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 20:06:24.032 04/05/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 20:06:24.032 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 51 20:06:24.032 04/05/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 20:06:24.032 04/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 20:06:24.072 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 54 20:06:24.072 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 55 20:06:24.072 04/05/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 20:06:54.065 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 57 20:06:54.065 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from 137.69.115.17 58 20:06:54.506 04/05/07 Sev=Info/4 CM/0x63100017 xAuth application returned 59 20:06:54.516 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 20:06:58.702 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 61 20:06:58.702 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 62 20:06:58.702 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 63 20:06:58.702 04/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 64 20:06:58.752 04/05/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 65 20:06:58.752 04/05/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 66 20:06:58.752 04/05/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 67 20:06:58.752 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 68 20:06:59.633 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 69 20:06:59.633 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 70 20:06:59.633 04/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.88 71 20:06:59.633 04/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 72 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 73 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 74 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 75 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 76 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 77 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 78 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 79 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 80 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 81 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 82 20:06:59.643 04/05/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 83 20:06:59.643 04/05/07 Sev=Info/4 CM/0x63100019 Mode Config data received 84 20:06:59.664 04/05/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.88, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 85 20:06:59.664 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 86 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 87 20:06:59.704 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 88 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 89 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 36 seconds, setting expiry to 86364 seconds from now 90 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 91 20:06:59.704 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 92 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 93 20:06:59.704 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 94 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=D5AB4B38 OUTBOUND SPI = 0x47727D98 INBOUND SPI = 0x92D0D546) 95 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x47727D98 96 20:06:59.704 04/05/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x92D0D546 97 20:07:00.304 04/05/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.88/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 98 20:07:00.365 04/05/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 99 20:07:00.405 04/05/07 Sev=Info/4 CM/0x6310001A One secure connection established 100 20:07:00.705 04/05/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.100. Current address(es): 192.168.1.100, 10.13.32.88, 192.168.5.1. 101 20:07:00.705 04/05/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.88. Current address(es): 192.168.1.100, 10.13.32.88, 192.168.5.1. 102 20:07:00.775 04/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 103 20:07:00.775 04/05/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 104 20:07:00.775 04/05/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 105 20:07:00.775 04/05/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x987d7247 into key list 106 20:07:00.775 04/05/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 107 20:07:00.775 04/05/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x46d5d092 into key list 108 20:07:00.775 04/05/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.88 109 20:07:03.850 04/05/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x987d7247 for inbound key with SPI=0x46d5d092 110 20:08:33.988 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817051 111 20:08:33.988 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 112 20:08:34.018 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 113 20:08:34.018 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 114 20:08:34.018 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817052, seq# expected = 99817052 115 20:09:35.074 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817052 116 20:09:35.074 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 117 20:09:35.104 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 118 20:09:35.104 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 119 20:09:35.104 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817053, seq# expected = 99817053 120 20:11:24.239 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 121 20:16:25.176 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 122 20:20:20.509 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817053 123 20:20:20.509 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 124 20:20:20.549 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 125 20:20:20.549 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 126 20:20:20.549 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817054, seq# expected = 99817054 127 20:21:25.101 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 128 20:22:42.721 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817054 129 20:22:42.721 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 130 20:22:42.761 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 131 20:22:42.761 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 132 20:22:42.761 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817055, seq# expected = 99817055 133 20:22:53.236 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817055 134 20:22:53.236 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 135 20:22:53.266 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 136 20:22:53.266 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 137 20:22:53.266 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817056, seq# expected = 99817056 138 20:24:40.403 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817056 139 20:24:40.403 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 140 20:24:40.433 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 141 20:24:40.433 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 142 20:24:40.433 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817057, seq# expected = 99817057 143 20:26:25.578 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 144 20:29:34.392 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817057 145 20:29:34.392 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 146 20:29:34.422 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 147 20:29:34.422 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 148 20:29:34.422 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817058, seq# expected = 99817058 149 20:31:26.071 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 150 20:32:21.159 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817058 151 20:32:21.159 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 152 20:32:21.189 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 153 20:32:21.189 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 154 20:32:21.189 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817059, seq# expected = 99817059 155 20:36:27.061 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 156 20:41:27.038 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 157 20:44:23.733 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817059 158 20:44:23.733 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 159 20:44:23.763 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 160 20:44:23.763 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 161 20:44:23.763 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817060, seq# expected = 99817060 162 20:46:27.346 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 163 20:51:27.742 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 164 20:54:50.509 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817060 165 20:54:50.509 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 166 20:54:50.539 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 167 20:54:50.539 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 168 20:54:50.539 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817061, seq# expected = 99817061 169 20:56:28.138 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 170 21:01:28.620 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 171 21:06:29.106 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 172 21:09:55.422 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817061 173 21:09:55.422 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 174 21:09:55.462 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 175 21:09:55.462 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 176 21:09:55.462 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817062, seq# expected = 99817062 177 21:11:29.558 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 178 21:16:30.490 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 179 21:21:30.432 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 180 21:26:31.364 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 181 21:31:31.786 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 182 21:36:32.231 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 183 21:39:55.013 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817062 184 21:39:55.013 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 185 21:39:55.043 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 186 21:39:55.043 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 187 21:39:55.043 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817063, seq# expected = 99817063 188 21:41:32.153 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 189 21:44:22.908 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817063 190 21:44:22.908 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 191 21:44:22.948 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 192 21:44:22.948 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 193 21:44:22.948 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817064, seq# expected = 99817064 194 21:46:33.085 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 195 21:51:33.525 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 196 21:54:50.805 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817064 197 21:54:50.805 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 198 21:54:50.835 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 199 21:54:50.835 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 200 21:54:50.835 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817065, seq# expected = 99817065 201 21:56:22.937 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817065 202 21:56:22.937 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 21:56:22.968 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 21:56:22.968 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 21:56:22.968 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817066, seq# expected = 99817066 206 21:56:33.453 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 207 22:01:33.905 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 208 22:06:34.327 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 209 22:07:13.380 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817066 210 22:07:13.380 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 211 22:07:13.420 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 212 22:07:13.420 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 213 22:07:13.420 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817067, seq# expected = 99817067 214 22:07:43.921 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817067 215 22:07:43.921 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 216 22:07:43.951 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 217 22:07:43.951 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 218 22:07:43.951 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817068, seq# expected = 99817068 219 22:07:54.435 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817068 220 22:07:54.435 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 221 22:07:54.465 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 222 22:07:54.465 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 223 22:07:54.465 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817069, seq# expected = 99817069 224 22:08:14.962 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817069 225 22:08:14.962 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 226 22:08:14.992 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 227 22:08:14.992 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 228 22:08:14.992 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817070, seq# expected = 99817070 229 22:09:50.600 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817070 230 22:09:50.600 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 231 22:09:50.630 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 232 22:09:50.630 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 233 22:09:50.630 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817071, seq# expected = 99817071 234 22:11:34.740 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 235 22:16:35.666 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 236 22:20:19.413 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817071 237 22:20:19.413 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 238 22:20:19.453 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 239 22:20:19.453 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 240 22:20:19.453 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817072, seq# expected = 99817072 241 22:21:36.021 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 242 22:24:54.308 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817072 243 22:24:54.308 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 244 22:24:54.348 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 245 22:24:54.348 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 246 22:24:54.348 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817073, seq# expected = 99817073 247 22:25:19.846 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817073 248 22:25:19.846 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 249 22:25:19.876 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 250 22:25:19.876 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 251 22:25:19.876 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817074, seq# expected = 99817074 252 22:26:35.969 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 253 22:31:36.416 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 254 22:32:24.474 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817074 255 22:32:24.474 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 256 22:32:24.514 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 257 22:32:24.514 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 258 22:32:24.514 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817075, seq# expected = 99817075 259 22:36:36.835 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 260 22:39:55.118 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817075 261 22:39:55.118 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 262 22:39:55.158 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 263 22:39:55.158 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 264 22:39:55.158 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817076, seq# expected = 99817076 265 22:41:38.267 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 266 22:44:24.523 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817076 267 22:44:24.523 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 268 22:44:24.553 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 269 22:44:24.553 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 270 22:44:24.553 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817077, seq# expected = 99817077 271 22:46:38.219 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 272 22:51:38.651 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 273 22:54:54.933 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817077 274 22:54:54.943 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 275 22:54:54.973 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 276 22:54:54.973 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 277 22:54:54.973 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817078, seq# expected = 99817078 278 22:56:25.563 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817078 279 22:56:25.563 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 280 22:56:25.603 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 281 22:56:25.603 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 282 22:56:25.603 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817079, seq# expected = 99817079 283 22:56:38.582 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 284 23:01:39.517 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 285 23:06:39.950 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 286 23:08:30.108 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817079 287 23:08:30.108 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 288 23:08:30.138 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 289 23:08:30.138 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 290 23:08:30.138 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817080, seq# expected = 99817080 291 23:11:40.382 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 292 23:16:40.824 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 293 23:20:31.145 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817080 294 23:20:31.145 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 295 23:20:31.175 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 296 23:20:31.175 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 297 23:20:31.175 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817081, seq# expected = 99817081 298 23:21:40.745 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 299 23:24:53.021 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817081 300 23:24:53.021 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 301 23:24:53.051 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 302 23:24:53.061 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 303 23:24:53.061 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817082, seq# expected = 99817082 304 23:26:41.177 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 305 23:31:42.110 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 306 23:36:42.552 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 307 23:39:53.326 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817082 308 23:39:53.326 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 309 23:39:53.366 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 310 23:39:53.366 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 311 23:39:53.366 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817083, seq# expected = 99817083 312 23:41:42.483 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 313 23:46:43.416 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 314 23:51:43.848 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 315 23:54:54.622 04/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817083 316 23:54:54.622 04/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 317 23:54:54.662 04/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 318 23:54:54.662 04/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 319 23:54:54.662 04/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817084, seq# expected = 99817084 320 23:56:43.779 04/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 321 00:01:44.712 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 322 00:06:45.139 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 323 00:07:35.706 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817084 324 00:07:35.706 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 325 00:07:35.736 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 326 00:07:35.736 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 327 00:07:35.736 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817085, seq# expected = 99817085 328 00:08:26.273 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817085 329 00:08:26.273 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 330 00:08:26.303 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 331 00:08:26.303 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 332 00:08:26.303 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817086, seq# expected = 99817086 333 00:09:02.321 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817086 334 00:09:02.321 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 335 00:09:02.351 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 336 00:09:02.351 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 337 00:09:02.351 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817087, seq# expected = 99817087 338 00:09:53.389 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817087 339 00:09:53.389 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 340 00:09:53.419 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 341 00:09:53.419 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 342 00:09:53.419 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817088, seq# expected = 99817088 343 00:11:45.541 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 344 00:16:45.958 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 345 00:20:25.272 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817088 346 00:20:25.272 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 347 00:20:25.302 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 348 00:20:25.302 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 349 00:20:25.302 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817089, seq# expected = 99817089 350 00:21:46.385 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 351 00:24:53.655 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817089 352 00:24:53.655 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 353 00:24:53.685 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 354 00:24:53.685 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 355 00:24:53.685 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817090, seq# expected = 99817090 356 00:25:39.208 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817090 357 00:25:39.208 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 358 00:25:39.238 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 359 00:25:39.238 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 360 00:25:39.238 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817091, seq# expected = 99817091 361 00:26:46.301 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 362 00:31:47.249 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 363 00:32:25.802 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817091 364 00:32:25.802 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 365 00:32:25.832 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 366 00:32:25.832 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 367 00:32:25.832 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817092, seq# expected = 99817092 368 00:36:47.175 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 369 00:39:52.422 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817092 370 00:39:52.422 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 371 00:39:52.452 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 372 00:39:52.452 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 373 00:39:52.452 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817093, seq# expected = 99817093 374 00:41:47.618 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 375 00:44:25.406 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817093 376 00:44:25.406 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 377 00:44:25.436 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 378 00:44:25.436 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 379 00:44:25.436 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817094, seq# expected = 99817094 380 00:46:48.136 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 381 00:51:48.574 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 382 00:54:54.846 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817094 383 00:54:54.846 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 384 00:54:54.886 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 385 00:54:54.886 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 386 00:54:54.896 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817095, seq# expected = 99817095 387 00:56:48.522 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 388 01:01:49.450 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 389 01:06:49.888 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 390 01:08:28.532 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817095 391 01:08:28.532 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 392 01:08:28.582 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 393 01:08:28.582 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 394 01:08:28.582 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817096, seq# expected = 99817096 395 01:09:54.157 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817096 396 01:09:54.157 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 397 01:09:54.187 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 398 01:09:54.187 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 399 01:09:54.187 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817097, seq# expected = 99817097 400 01:11:49.826 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 401 01:16:50.741 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 402 01:20:27.524 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817097 403 01:20:27.524 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 404 01:20:27.554 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 405 01:20:27.554 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 406 01:20:27.554 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817098, seq# expected = 99817098 407 01:21:50.644 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 408 01:24:55.412 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817098 409 01:24:55.412 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 410 01:24:55.442 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 411 01:24:55.442 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 412 01:24:55.442 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817099, seq# expected = 99817099 413 01:26:51.089 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 414 01:31:52.025 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 415 01:32:32.083 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817099 416 01:32:32.083 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 417 01:32:32.113 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 418 01:32:32.113 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 419 01:32:32.113 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817100, seq# expected = 99817100 420 01:36:51.969 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 421 01:39:51.219 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817100 422 01:39:51.219 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 423 01:39:51.249 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 424 01:39:51.259 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 425 01:39:51.259 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817101, seq# expected = 99817101 426 01:41:52.394 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 427 01:44:28.621 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817101 428 01:44:28.621 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 429 01:44:28.661 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 430 01:44:28.661 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 431 01:44:28.661 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817102, seq# expected = 99817102 432 01:46:53.330 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 433 01:51:54.266 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 434 01:54:56.029 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817102 435 01:54:56.029 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 436 01:54:56.059 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 437 01:54:56.059 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 438 01:54:56.059 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817103, seq# expected = 99817103 439 01:56:53.709 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 440 02:01:54.645 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 441 02:05:02.417 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817103 442 02:05:02.417 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 443 02:05:02.447 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 444 02:05:02.447 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 445 02:05:02.447 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817104, seq# expected = 99817104 446 02:06:54.589 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 447 02:08:34.724 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817104 448 02:08:34.724 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 449 02:08:34.764 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 450 02:08:34.764 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 451 02:08:34.764 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817105, seq# expected = 99817105 452 02:09:25.798 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817105 453 02:09:25.798 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 454 02:09:25.828 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 455 02:09:25.828 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 456 02:09:25.828 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817106, seq# expected = 99817106 457 02:09:51.335 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817106 458 02:09:51.335 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 459 02:09:51.365 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 460 02:09:51.365 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 461 02:09:51.365 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817107, seq# expected = 99817107 462 02:11:55.014 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 463 02:16:56.451 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 464 02:20:30.761 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817107 465 02:20:30.761 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 466 02:20:30.801 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 467 02:20:30.801 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 468 02:20:30.801 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817108, seq# expected = 99817108 469 02:21:55.894 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 470 02:24:53.632 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817108 471 02:24:53.632 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 472 02:24:53.662 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 473 02:24:53.662 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 474 02:24:53.662 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817109, seq# expected = 99817109 475 02:25:54.716 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817109 476 02:25:54.716 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 477 02:25:54.746 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 478 02:25:54.746 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 479 02:25:54.746 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817110, seq# expected = 99817110 480 02:26:56.301 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 481 02:31:56.743 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 482 02:32:25.275 04/06/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x987d7247 is about to expire, requesting a new one 483 02:32:25.275 04/06/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.88, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 484 02:32:25.275 04/06/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=9F7DA314) Initiator = ID=10.13.32.88 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 485 02:32:25.275 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 486 02:32:25.315 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 487 02:32:25.315 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 488 02:32:25.315 04/06/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 489 02:32:25.315 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 490 02:32:25.315 04/06/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=9F7DA314 OUTBOUND SPI = 0x39ED328F INBOUND SPI = 0xB912919B) 491 02:32:25.315 04/06/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x39ED328F 492 02:32:25.315 04/06/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xB912919B 493 02:32:25.315 04/06/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 494 02:32:25.795 04/06/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 495 02:32:25.795 04/06/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x8f32ed39 into key list 496 02:32:25.795 04/06/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 497 02:32:25.795 04/06/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9b9112b9 into key list 498 02:32:55.308 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 499 02:32:55.308 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 500 02:32:55.308 04/06/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 47727D98 INBOUND SPI = 92D0D546) 501 02:32:55.308 04/06/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=D5AB4B38 502 02:32:55.328 04/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x46d5d092 503 02:32:55.328 04/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x46d5d092 504 02:32:55.328 04/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x987d7247 505 02:32:55.328 04/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x987d7247 506 02:35:40.557 04/06/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x8f32ed39 for inbound key with SPI=0x9b9112b9 507 02:36:57.188 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 508 02:39:52.432 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817110 509 02:39:52.442 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 510 02:39:52.472 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 511 02:39:52.472 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 512 02:39:52.472 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817111, seq# expected = 99817111 513 02:41:57.613 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 514 02:44:30.835 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817111 515 02:44:30.835 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 516 02:44:30.875 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 517 02:44:30.875 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 518 02:44:30.875 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817112, seq# expected = 99817112 519 02:46:59.050 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 520 02:51:58.984 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 521 02:54:52.736 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817112 522 02:54:52.736 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 523 02:54:52.766 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 524 02:54:52.766 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 525 02:54:52.766 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817113, seq# expected = 99817113 526 02:56:59.429 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 527 03:01:59.874 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 528 03:07:00.830 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 529 03:08:31.952 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817113 530 03:08:31.952 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 531 03:08:31.982 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 532 03:08:31.982 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 533 03:08:31.992 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817114, seq# expected = 99817114 534 03:09:53.570 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817114 535 03:09:53.570 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 536 03:09:53.600 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 537 03:09:53.600 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 538 03:09:53.600 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817115, seq# expected = 99817115 539 03:12:00.754 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 540 03:17:01.189 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 541 03:20:32.505 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817115 542 03:20:32.505 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 543 03:20:32.535 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 544 03:20:32.535 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 545 03:20:32.535 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817116, seq# expected = 99817116 546 03:22:01.133 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 547 03:24:51.380 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817116 548 03:24:51.380 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 549 03:24:51.420 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 550 03:24:51.420 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 551 03:24:51.420 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817117, seq# expected = 99817117 552 03:27:01.568 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 553 03:32:02.484 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 554 03:32:31.017 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817117 555 03:32:31.017 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 556 03:32:31.118 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 557 03:32:31.118 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 558 03:32:31.118 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817118, seq# expected = 99817118 559 03:37:02.852 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 560 03:39:51.099 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817118 561 03:39:51.099 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 562 03:39:51.129 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 563 03:39:51.129 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 564 03:39:51.129 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817119, seq# expected = 99817119 565 03:42:02.775 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 566 03:44:36.501 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817119 567 03:44:36.501 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 568 03:44:36.531 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 569 03:44:36.531 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 570 03:44:36.531 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817120, seq# expected = 99817120 571 03:47:03.238 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 572 03:52:03.651 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 573 03:54:53.410 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817120 574 03:54:53.410 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 575 03:54:53.440 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 576 03:54:53.440 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 577 03:54:53.440 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817121, seq# expected = 99817121 578 03:57:05.085 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 579 04:02:05.518 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 580 04:07:05.430 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 581 04:08:35.057 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817121 582 04:08:35.057 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 583 04:08:35.087 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 584 04:08:35.087 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 585 04:08:35.087 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817122, seq# expected = 99817122 586 04:09:38.145 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817122 587 04:09:38.145 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 588 04:09:38.176 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 589 04:09:38.176 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 590 04:09:38.176 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817123, seq# expected = 99817123 591 04:12:06.354 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 592 04:17:06.276 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 593 04:20:35.070 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817123 594 04:20:35.070 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 595 04:20:35.100 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 596 04:20:35.100 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 597 04:20:35.100 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817124, seq# expected = 99817124 598 04:22:06.199 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 599 04:26:15.550 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817124 600 04:26:15.550 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 601 04:26:15.590 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 602 04:26:15.590 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 603 04:26:15.590 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817125, seq# expected = 99817125 604 04:27:07.132 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 605 04:32:07.555 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 606 04:32:41.103 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817125 607 04:32:41.103 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 608 04:32:41.133 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 609 04:32:41.133 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 610 04:32:41.133 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817126, seq# expected = 99817126 611 04:37:08.479 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 612 04:39:53.712 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817126 613 04:39:53.712 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 614 04:39:53.742 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 615 04:39:53.752 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 616 04:39:53.752 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817127, seq# expected = 99817127 617 04:42:07.901 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 618 04:44:39.124 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817127 619 04:44:39.124 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 620 04:44:39.154 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 621 04:44:39.154 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 622 04:44:39.154 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817128, seq# expected = 99817128 623 04:47:08.824 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 624 04:52:09.748 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 625 04:54:46.469 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817128 626 04:54:46.469 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 627 04:54:46.499 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 628 04:54:46.499 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 629 04:54:46.499 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817129, seq# expected = 99817129 630 04:55:32.053 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817129 631 04:55:32.053 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 632 04:55:32.083 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 633 04:55:32.083 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 634 04:55:32.083 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817130, seq# expected = 99817130 635 04:56:39.158 04/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 99817130 636 04:56:39.158 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 637 04:56:39.188 04/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 638 04:56:39.188 04/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 639 04:56:39.188 04/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 99817131, seq# expected = 99817131 640 04:57:09.721 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 641 05:02:09.693 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 642 05:07:10.827 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 643 05:12:09.848 04/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 3286, dst port 4005 644 05:14:05.391 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 645 05:14:05.391 04/06/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 39ED328F INBOUND SPI = B912919B) 646 05:14:05.391 04/06/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=9F7DA314 647 05:14:05.391 04/06/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=BA1C638150ADE764 R_Cookie=884D3676E4AF17F6) reason = DEL_REASON_RESET_SADB 648 05:14:05.391 04/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 649 05:14:05.391 04/06/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=BA1C638150ADE764 R_Cookie=884D3676E4AF17F6) reason = DEL_REASON_RESET_SADB 650 05:14:05.391 04/06/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 651 05:14:05.391 04/06/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 652 05:14:05.391 04/06/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 653 05:14:05.391 04/06/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 3286 for TCP connection. 654 05:14:05.391 04/06/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 9:7:5 655 05:14:05.401 04/06/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 656 05:14:05.431 04/06/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 657 05:14:07.053 04/06/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 658 05:14:29.906 04/06/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 659 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9b9112b9 660 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9b9112b9 661 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8f32ed39 662 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8f32ed39 663 05:14:31.027 04/06/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 3286, dst port 4005 664 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 665 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 666 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 667 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 668 05:14:31.027 04/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 669 05:14:31.027 04/06/07 Sev=Warning/2 IKE/0xA3000067 Received an IPC message during invalid state (IKE_MAIN:511)