EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 20:32:57.805 04/13/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 20:32:57.835 04/13/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 20:32:57.835 04/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 20:32:57.855 04/13/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1081 for TCP connection. 5 20:32:58.195 04/13/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 20:32:58.195 04/13/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 20:32:58.195 04/13/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1081, dst port 4005 8 20:32:58.195 04/13/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1081 9 20:32:58.195 04/13/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1081, dst port 4005 10 20:32:58.195 04/13/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 20:32:58.696 04/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 20:32:58.736 04/13/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 20:32:58.866 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 20:32:59.046 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 20:32:59.046 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 20:32:59.046 04/13/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 20:32:59.046 04/13/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 20:32:59.046 04/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 20:32:59.046 04/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 20:32:59.096 04/13/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 20:32:59.096 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 20:32:59.096 04/13/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 20:32:59.096 04/13/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 20:32:59.146 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 20:32:59.146 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 20:32:59.146 04/13/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 20:32:59.146 04/13/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=75D8E5B9144AC3E8 R_Cookie=929191FEAE4651C7) reason = DEL_REASON_LOAD_BALANCING 28 20:32:59.146 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 20:32:59.697 04/13/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=75D8E5B9144AC3E8 R_Cookie=929191FEAE4651C7) reason = DEL_REASON_LOAD_BALANCING 30 20:32:59.697 04/13/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 20:32:59.697 04/13/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 20:32:59.697 04/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 20:32:59.717 04/13/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 20:33:00.198 04/13/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1081, dst port 4005 35 20:33:00.198 04/13/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1081, dst port 4005 36 20:33:00.198 04/13/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1081 37 20:33:00.198 04/13/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1081, dst port 4005 38 20:33:00.198 04/13/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 20:33:00.699 04/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 20:33:00.709 04/13/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 20:33:00.729 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 20:33:00.909 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 20:33:00.909 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 20:33:00.909 04/13/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 20:33:00.909 04/13/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 20:33:00.909 04/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 20:33:00.909 04/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 20:33:00.929 04/13/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 20:33:00.929 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 20:33:00.929 04/13/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 20:33:00.929 04/13/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 20:33:00.959 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 20:33:00.959 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 20:33:00.959 04/13/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 20:33:22.380 04/13/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 20:33:22.380 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 20:33:26.846 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 20:33:26.846 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 20:33:26.846 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 20:33:26.846 04/13/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 20:33:26.906 04/13/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 20:33:26.906 04/13/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 20:33:26.906 04/13/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 20:33:26.916 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 20:33:27.858 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.98 68 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 20:33:27.858 04/13/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 20:33:28.058 04/13/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 20:33:28.078 04/13/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.98, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 20:33:28.078 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 20:33:28.118 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 20:33:28.118 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 20:33:28.118 04/13/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 20:33:28.118 04/13/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 28 seconds, setting expiry to 86372 seconds from now 87 20:33:28.118 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 20:33:28.118 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 20:33:28.128 04/13/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 20:33:28.128 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 20:33:28.128 04/13/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=B2438E65 OUTBOUND SPI = 0x59C666AC INBOUND SPI = 0x0296617A) 92 20:33:28.128 04/13/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x59C666AC 93 20:33:28.128 04/13/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x0296617A 94 20:33:30.982 04/13/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.98/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 20:33:31.042 04/13/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 20:33:31.092 04/13/07 Sev=Info/4 CM/0x6310001A One secure connection established 97 20:33:31.153 04/13/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.13.8.98, 192.168.5.1. 98 20:33:31.153 04/13/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.98. Current address(es): 192.168.1.102, 10.13.8.98, 192.168.5.1. 99 20:33:31.383 04/13/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 20:33:31.383 04/13/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 20:33:31.383 04/13/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 20:33:31.383 04/13/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xac66c659 into key list 103 20:33:31.383 04/13/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 20:33:31.383 04/13/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7a619602 into key list 105 20:33:31.383 04/13/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.98 106 20:33:34.247 04/13/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xac66c659 for inbound key with SPI=0x7a619602 107 20:38:01.220 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 108 20:41:13.011 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405357 109 20:41:13.011 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 110 20:41:13.041 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 111 20:41:13.041 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 112 20:41:13.041 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405358, seq# expected = 2296405358 113 20:43:01.167 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 114 20:46:03.930 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405358 115 20:46:03.930 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 116 20:46:03.960 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 117 20:46:03.960 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 118 20:46:03.960 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405359, seq# expected = 2296405359 119 20:48:01.599 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 120 20:53:02.529 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 121 20:58:02.454 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 122 20:58:05.458 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405359 123 20:58:05.458 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 124 20:58:05.488 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 125 20:58:05.488 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 126 20:58:05.488 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405360, seq# expected = 2296405360 127 20:58:36.002 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405360 128 20:58:36.002 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 129 20:58:36.022 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 130 20:58:36.032 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 131 20:58:36.032 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405361, seq# expected = 2296405361 132 21:03:02.980 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 133 21:08:02.906 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 134 21:10:02.578 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405361 135 21:10:02.578 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 136 21:10:02.608 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 137 21:10:02.608 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 138 21:10:02.608 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405362, seq# expected = 2296405362 139 21:13:03.839 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 140 21:18:04.271 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 141 21:21:14.043 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405362 142 21:21:14.043 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 21:21:14.073 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 144 21:21:14.073 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 145 21:21:14.073 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405363, seq# expected = 2296405363 146 21:22:04.616 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405363 147 21:22:04.616 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 148 21:22:04.646 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 149 21:22:04.646 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 150 21:22:04.646 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405364, seq# expected = 2296405364 151 21:23:04.202 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 152 21:28:04.622 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 153 21:33:05.042 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 154 21:38:05.465 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 155 21:43:06.399 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 156 21:46:02.173 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405364 157 21:46:02.173 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 158 21:46:02.203 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 159 21:46:02.203 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 160 21:46:02.203 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405365, seq# expected = 2296405365 161 21:48:06.359 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 162 21:51:13.129 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405365 163 21:51:13.129 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 164 21:51:13.159 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 165 21:51:13.159 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 166 21:51:13.159 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405366, seq# expected = 2296405366 167 21:53:06.794 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 168 21:57:59.217 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405366 169 21:57:59.217 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 170 21:57:59.247 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 171 21:57:59.247 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 172 21:57:59.247 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405367, seq# expected = 2296405367 173 21:58:07.229 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 174 22:03:08.165 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 175 22:08:08.099 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 176 22:10:05.769 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405367 177 22:10:05.769 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 178 22:10:05.799 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 179 22:10:05.799 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 180 22:10:05.799 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405368, seq# expected = 2296405368 181 22:13:08.534 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 182 22:16:46.849 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405368 183 22:16:46.849 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 184 22:16:46.879 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 185 22:16:46.879 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 186 22:16:46.879 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405369, seq# expected = 2296405369 187 22:16:57.364 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405369 188 22:16:57.364 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 189 22:16:57.394 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 190 22:16:57.394 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 191 22:16:57.394 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405370, seq# expected = 2296405370 192 22:17:07.879 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405370 193 22:17:07.879 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 194 22:17:07.909 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 195 22:17:07.909 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 196 22:17:07.909 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405371, seq# expected = 2296405371 197 22:18:08.966 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 198 22:21:13.730 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405371 199 22:21:13.730 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 200 22:21:13.760 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 201 22:21:13.760 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 202 22:21:13.760 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405372, seq# expected = 2296405372 203 22:21:59.296 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405372 204 22:21:59.296 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 205 22:21:59.326 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 206 22:21:59.326 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 207 22:21:59.326 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405373, seq# expected = 2296405373 208 22:23:09.397 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 209 22:28:10.329 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 210 22:33:10.761 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 211 22:38:11.188 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 212 22:41:31.474 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405373 213 22:41:31.474 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 214 22:41:31.504 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 215 22:41:31.504 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 216 22:41:31.504 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405374, seq# expected = 2296405374 217 22:43:11.117 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 218 22:45:57.354 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405374 219 22:45:57.354 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 220 22:45:57.374 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 221 22:45:57.374 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 222 22:45:57.374 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405375, seq# expected = 2296405375 223 22:48:11.546 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 224 22:51:13.305 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405375 225 22:51:13.305 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 226 22:51:13.335 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 227 22:51:13.335 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 228 22:51:13.335 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405376, seq# expected = 2296405376 229 22:53:11.975 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 230 22:57:59.385 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405376 231 22:57:59.385 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 232 22:57:59.415 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 233 22:57:59.415 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 234 22:57:59.415 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405377, seq# expected = 2296405377 235 22:58:12.404 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 236 23:03:13.333 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 237 23:08:13.762 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 238 23:10:00.915 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405377 239 23:10:00.915 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 240 23:10:00.945 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 241 23:10:00.945 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 242 23:10:00.945 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405378, seq# expected = 2296405378 243 23:13:14.191 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 244 23:18:14.620 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 245 23:21:12.374 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405378 246 23:21:12.374 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 247 23:21:12.404 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 248 23:21:12.404 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 249 23:21:12.404 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405379, seq# expected = 2296405379 250 23:22:02.946 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405379 251 23:22:02.946 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 252 23:22:02.966 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 253 23:22:02.966 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 254 23:22:02.966 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405380, seq# expected = 2296405380 255 23:23:14.549 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 256 23:28:15.491 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 257 23:33:15.930 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 258 23:33:59.493 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405380 259 23:33:59.493 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 260 23:33:59.523 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 261 23:33:59.533 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 262 23:33:59.533 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405381, seq# expected = 2296405381 263 23:38:15.864 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 264 23:43:16.299 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 265 23:46:01.037 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405381 266 23:46:01.037 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 267 23:46:01.067 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 268 23:46:01.067 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 269 23:46:01.067 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405382, seq# expected = 2296405382 270 23:48:16.734 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 271 23:51:11.988 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405382 272 23:51:11.988 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 273 23:51:12.018 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 274 23:51:12.018 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 275 23:51:12.018 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405383, seq# expected = 2296405383 276 23:53:17.169 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 277 23:58:03.083 04/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405383 278 23:58:03.083 04/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 279 23:58:03.113 04/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 280 23:58:03.113 04/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 281 23:58:03.113 04/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405384, seq# expected = 2296405384 282 23:58:17.604 04/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 283 00:03:18.515 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 284 00:08:18.939 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 285 00:10:04.589 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405384 286 00:10:04.589 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 00:10:04.609 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 00:10:04.609 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 00:10:04.609 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405385, seq# expected = 2296405385 290 00:13:18.865 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 291 00:18:19.791 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 292 00:21:11.034 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405385 293 00:21:11.034 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 294 00:21:11.064 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 295 00:21:11.064 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 296 00:21:11.064 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405386, seq# expected = 2296405386 297 00:22:01.606 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405386 298 00:22:01.606 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 299 00:22:01.626 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 300 00:22:01.636 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 301 00:22:01.636 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405387, seq# expected = 2296405387 302 00:23:19.717 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 303 00:28:20.643 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 304 00:33:21.075 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 305 00:33:58.132 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405387 306 00:33:58.132 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 307 00:33:58.152 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 308 00:33:58.152 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 309 00:33:58.152 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405388, seq# expected = 2296405388 310 00:34:13.656 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405388 311 00:34:13.656 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 312 00:34:13.686 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 313 00:34:13.686 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 314 00:34:13.686 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405389, seq# expected = 2296405389 315 00:38:21.032 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 316 00:43:21.464 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 317 00:48:22.396 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 318 00:51:10.638 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405389 319 00:51:10.638 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 320 00:51:10.668 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 321 00:51:10.668 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 322 00:51:10.668 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405390, seq# expected = 2296405390 323 00:53:22.328 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 324 00:57:56.722 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405390 325 00:57:56.722 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 326 00:57:56.742 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 327 00:57:56.742 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 328 00:57:56.742 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405391, seq# expected = 2296405391 329 00:58:22.760 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 330 01:03:23.192 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 331 01:08:24.123 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 332 01:13:24.050 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 333 01:16:58.858 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405391 334 01:16:58.858 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 335 01:16:58.888 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 336 01:16:58.888 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 337 01:16:58.888 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405392, seq# expected = 2296405392 338 01:18:24.482 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 339 01:21:14.726 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405392 340 01:21:14.726 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 341 01:21:14.756 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 342 01:21:14.756 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 343 01:21:14.756 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405393, seq# expected = 2296405393 344 01:23:25.414 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 345 01:28:25.346 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 346 01:29:00.897 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405393 347 01:29:00.897 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 348 01:29:00.927 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 349 01:29:00.927 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 350 01:29:00.927 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405394, seq# expected = 2296405394 351 01:33:26.278 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 352 01:38:26.210 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 353 01:43:27.142 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 354 01:48:27.574 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 355 01:51:13.313 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405394 356 01:51:13.313 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 357 01:51:13.333 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 358 01:51:13.333 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 359 01:51:13.333 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405395, seq# expected = 2296405395 360 01:53:03.972 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405395 361 01:53:03.972 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 362 01:53:03.992 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 363 01:53:04.002 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 364 01:53:04.002 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405396, seq# expected = 2296405396 365 01:53:27.506 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 366 01:58:27.938 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 367 02:03:28.370 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 368 02:05:05.509 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405396 369 02:05:05.509 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 370 02:05:05.529 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 371 02:05:05.529 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 372 02:05:05.529 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405397, seq# expected = 2296405397 373 02:08:29.302 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 374 02:13:29.234 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 375 02:17:02.040 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405397 376 02:17:02.040 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 377 02:17:02.070 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 378 02:17:02.070 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 379 02:17:02.070 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405398, seq# expected = 2296405398 380 02:18:29.666 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 381 02:21:12.900 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405398 382 02:21:12.900 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 383 02:21:12.930 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 384 02:21:12.930 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 385 02:21:12.930 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405399, seq# expected = 2296405399 386 02:23:30.598 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 387 02:28:30.530 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 388 02:33:31.462 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 389 02:34:24.539 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405399 390 02:34:24.539 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 391 02:34:24.559 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 392 02:34:24.559 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 393 02:34:24.559 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405400, seq# expected = 2296405400 394 02:38:31.394 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 395 02:40:55.601 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405400 396 02:40:55.601 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 397 02:40:55.631 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 398 02:40:55.631 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 399 02:40:55.631 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405401, seq# expected = 2296405401 400 02:42:11.210 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405401 401 02:42:11.210 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 402 02:42:11.230 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 403 02:42:11.240 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 404 02:42:11.240 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405402, seq# expected = 2296405402 405 02:43:31.826 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 406 02:48:32.758 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 407 02:51:12.487 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405402 408 02:51:12.487 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 409 02:51:12.517 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 410 02:51:12.517 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 411 02:51:12.517 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405403, seq# expected = 2296405403 412 02:52:58.138 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405403 413 02:52:58.138 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 414 02:52:58.168 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 415 02:52:58.168 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 416 02:52:58.168 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405404, seq# expected = 2296405404 417 02:53:32.687 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 418 02:58:33.119 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 419 02:59:02.661 04/14/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xac66c659 is about to expire, requesting a new one 420 02:59:02.661 04/14/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.98, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 421 02:59:02.661 04/14/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=01F575EC) Initiator = ID=10.13.8.98 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 422 02:59:02.661 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 423 02:59:02.691 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 424 02:59:02.691 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 425 02:59:02.691 04/14/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 426 02:59:02.691 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 427 02:59:02.691 04/14/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=01F575EC OUTBOUND SPI = 0x197B413D INBOUND SPI = 0xAE472C58) 428 02:59:02.691 04/14/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x197B413D 429 02:59:02.691 04/14/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xAE472C58 430 02:59:02.691 04/14/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 431 02:59:03.182 04/14/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 432 02:59:03.182 04/14/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3d417b19 into key list 433 02:59:03.182 04/14/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 434 02:59:03.182 04/14/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x582c47ae into key list 435 02:59:32.694 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 436 02:59:32.694 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 437 02:59:32.694 04/14/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 59C666AC INBOUND SPI = 296617A) 438 02:59:32.694 04/14/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=B2438E65 439 02:59:32.714 04/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7a619602 440 02:59:32.714 04/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7a619602 441 02:59:32.714 04/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xac66c659 442 02:59:32.714 04/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xac66c659 443 03:01:50.402 04/14/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x3d417b19 for inbound key with SPI=0x582c47ae 444 03:03:34.051 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 445 03:08:34.483 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 446 03:13:34.915 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 447 03:17:00.711 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405404 448 03:17:00.711 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 449 03:17:00.741 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 450 03:17:00.741 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 451 03:17:00.741 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405405, seq# expected = 2296405405 452 03:18:34.847 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 453 03:21:11.572 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405405 454 03:21:11.572 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 455 03:21:11.602 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 456 03:21:11.602 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 457 03:21:11.602 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405406, seq# expected = 2296405406 458 03:23:35.779 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 459 03:28:36.211 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 460 03:28:57.742 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405406 461 03:28:57.742 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 462 03:28:57.772 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 463 03:28:57.772 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 464 03:28:57.772 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405407, seq# expected = 2296405407 465 03:33:36.643 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 466 03:38:37.075 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 467 03:40:59.280 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405407 468 03:40:59.280 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 469 03:40:59.310 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 470 03:40:59.310 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 471 03:40:59.310 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405408, seq# expected = 2296405408 472 03:43:37.007 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 473 03:48:37.939 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 474 03:51:10.659 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405408 475 03:51:10.659 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 476 03:51:10.689 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 477 03:51:10.689 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 478 03:51:10.689 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405409, seq# expected = 2296405409 479 03:53:37.871 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 480 03:58:38.300 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 481 04:03:39.226 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 482 04:04:57.339 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405409 483 04:04:57.339 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 484 04:04:57.369 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 485 04:04:57.369 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 486 04:04:57.369 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405410, seq# expected = 2296405410 487 04:08:39.158 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 488 04:13:40.090 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 489 04:16:58.876 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405410 490 04:16:58.876 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 491 04:16:58.906 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 492 04:16:58.906 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 493 04:16:58.906 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405411, seq# expected = 2296405411 494 04:18:40.022 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 495 04:21:14.744 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405411 496 04:21:14.744 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 497 04:21:14.774 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 498 04:21:14.774 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 499 04:21:14.774 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405412, seq# expected = 2296405412 500 04:23:40.454 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 501 04:28:41.386 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 502 04:28:55.907 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405412 503 04:28:55.907 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 504 04:28:55.927 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 505 04:28:55.927 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 506 04:28:55.927 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405413, seq# expected = 2296405413 507 04:33:41.818 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 508 04:34:36.898 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405413 509 04:34:36.898 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 510 04:34:36.928 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 511 04:34:36.928 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 512 04:34:36.928 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405414, seq# expected = 2296405414 513 04:38:42.250 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 514 04:41:02.953 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405414 515 04:41:02.953 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 516 04:41:02.983 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 517 04:41:02.983 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 518 04:41:02.983 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405415, seq# expected = 2296405415 519 04:42:38.590 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405415 520 04:42:38.590 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 521 04:42:38.630 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 522 04:42:38.630 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 523 04:42:38.630 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405416, seq# expected = 2296405416 524 04:43:42.182 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 525 04:48:43.114 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 526 04:53:04.991 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405416 527 04:53:04.991 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 528 04:53:05.021 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 529 04:53:05.021 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 530 04:53:05.021 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405417, seq# expected = 2296405417 531 04:53:43.046 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 532 04:58:43.478 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 533 05:03:44.410 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 534 05:05:01.521 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405417 535 05:05:01.521 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 536 05:05:01.541 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 537 05:05:01.551 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 538 05:05:01.551 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405418, seq# expected = 2296405418 539 05:08:44.336 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 540 05:13:45.265 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 541 05:17:03.050 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405418 542 05:17:03.050 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 543 05:17:03.070 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 544 05:17:03.070 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 545 05:17:03.070 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405419, seq# expected = 2296405419 546 05:18:45.197 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 547 05:21:13.910 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405419 548 05:21:13.910 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 549 05:21:13.940 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 550 05:21:13.940 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 551 05:21:13.940 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405420, seq# expected = 2296405420 552 05:23:46.129 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 553 05:28:46.561 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 554 05:29:05.088 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405420 555 05:29:05.088 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 556 05:29:05.118 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 557 05:29:05.118 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 558 05:29:05.118 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405421, seq# expected = 2296405421 559 05:33:46.493 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 560 05:38:47.425 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 561 05:41:01.618 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405421 562 05:41:01.618 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 563 05:41:01.648 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 564 05:41:01.648 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 565 05:41:01.648 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405422, seq# expected = 2296405422 566 05:43:47.857 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 567 05:48:48.289 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 568 05:51:12.997 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405422 569 05:51:12.997 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 570 05:51:13.027 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 571 05:51:13.027 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 572 05:51:13.027 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405423, seq# expected = 2296405423 573 05:53:03.657 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405423 574 05:53:03.657 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 575 05:53:03.687 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 576 05:53:03.687 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 577 05:53:03.687 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405424, seq# expected = 2296405424 578 05:53:48.221 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 579 05:58:48.653 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 580 06:03:49.085 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 581 06:05:05.194 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405424 582 06:05:05.194 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 583 06:05:05.224 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 584 06:05:05.224 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 585 06:05:05.224 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405425, seq# expected = 2296405425 586 06:08:50.017 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 587 06:13:50.449 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 588 06:17:01.719 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405425 589 06:17:01.719 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 590 06:17:01.749 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 591 06:17:01.749 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 592 06:17:01.749 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405426, seq# expected = 2296405426 593 06:18:50.372 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 594 06:21:12.576 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405426 595 06:21:12.576 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 596 06:21:12.606 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 597 06:21:12.606 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 598 06:21:12.606 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405427, seq# expected = 2296405427 599 06:23:50.804 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 600 06:28:51.736 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 601 06:28:58.746 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405427 602 06:28:58.746 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 603 06:28:58.776 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 604 06:28:58.776 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 605 06:28:58.776 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405428, seq# expected = 2296405428 606 06:33:51.668 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 607 06:34:44.744 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405428 608 06:34:44.744 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 609 06:34:44.774 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 610 06:34:44.774 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 611 06:34:44.774 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405429, seq# expected = 2296405429 612 06:38:52.600 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 613 06:41:05.792 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405429 614 06:41:05.792 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 615 06:41:05.822 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 616 06:41:05.822 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 617 06:41:05.822 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405430, seq# expected = 2296405430 618 06:42:46.437 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405430 619 06:42:46.437 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 620 06:42:46.467 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 621 06:42:46.467 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 622 06:42:46.467 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405431, seq# expected = 2296405431 623 06:43:52.532 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 624 06:48:52.964 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 625 06:53:02.823 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405431 626 06:53:02.823 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 627 06:53:02.853 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 628 06:53:02.853 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 629 06:53:02.853 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405432, seq# expected = 2296405432 630 06:53:53.396 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 631 06:58:53.828 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 632 07:03:54.760 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 633 07:05:04.360 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405432 634 07:05:04.360 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 635 07:05:04.380 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 636 07:05:04.380 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 637 07:05:04.380 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405433, seq# expected = 2296405433 638 07:08:55.192 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 639 07:13:55.124 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 640 07:17:05.898 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405433 641 07:17:05.898 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 642 07:17:05.928 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 643 07:17:05.928 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 644 07:17:05.928 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405434, seq# expected = 2296405434 645 07:18:55.556 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 646 07:21:11.751 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405434 647 07:21:11.751 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 648 07:21:11.771 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 649 07:21:11.771 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 650 07:21:11.781 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405435, seq# expected = 2296405435 651 07:23:55.983 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 652 07:28:56.902 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 653 07:29:02.911 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405435 654 07:29:02.911 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 655 07:29:02.941 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 656 07:29:02.941 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 657 07:29:02.941 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405436, seq# expected = 2296405436 658 07:33:57.334 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 659 07:38:57.266 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 660 07:41:04.449 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405436 661 07:41:04.449 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 662 07:41:04.479 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 663 07:41:04.479 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 664 07:41:04.479 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405437, seq# expected = 2296405437 665 07:43:58.198 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 666 07:48:58.630 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 667 07:51:10.820 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405437 668 07:51:10.820 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 669 07:51:10.840 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 670 07:51:10.840 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 671 07:51:10.840 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405438, seq# expected = 2296405438 672 07:53:06.487 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405438 673 07:53:06.487 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 674 07:53:06.507 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 675 07:53:06.507 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 676 07:53:06.507 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405439, seq# expected = 2296405439 677 07:53:58.562 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 678 07:58:58.994 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 679 08:03:59.926 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 680 08:08:59.858 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 681 08:14:00.290 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 682 08:14:03.795 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405439 683 08:14:03.795 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 684 08:14:03.825 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 685 08:14:03.825 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 686 08:14:03.825 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405440, seq# expected = 2296405440 687 08:14:19.317 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405440 688 08:14:19.317 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 689 08:14:19.337 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 690 08:14:19.337 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 691 08:14:19.337 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405441, seq# expected = 2296405441 692 08:19:00.722 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 693 08:20:25.343 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405441 694 08:20:25.343 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 695 08:20:25.373 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 696 08:20:25.373 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 697 08:20:25.373 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405442, seq# expected = 2296405442 698 08:21:10.909 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405442 699 08:21:10.909 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 700 08:21:10.939 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 701 08:21:10.939 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 702 08:21:10.939 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405443, seq# expected = 2296405443 703 08:22:26.518 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405443 704 08:22:26.518 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 705 08:22:26.548 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 706 08:22:26.548 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 707 08:22:26.548 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405444, seq# expected = 2296405444 708 08:24:01.154 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 709 08:24:27.692 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405444 710 08:24:27.692 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 711 08:24:27.722 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 712 08:24:27.722 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 713 08:24:27.722 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405445, seq# expected = 2296405445 714 08:26:23.859 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405445 715 08:26:23.859 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 716 08:26:23.879 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 717 08:26:23.879 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 718 08:26:23.879 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405446, seq# expected = 2296405446 719 08:29:02.086 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 720 08:30:24.705 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405446 721 08:30:24.705 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 722 08:30:24.735 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 723 08:30:24.735 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 724 08:30:24.735 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405447, seq# expected = 2296405447 725 08:32:25.929 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405447 726 08:32:25.929 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 727 08:32:25.960 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 728 08:32:25.960 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 729 08:32:25.960 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405448, seq# expected = 2296405448 730 08:34:02.068 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 731 08:36:11.754 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405448 732 08:36:11.754 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 733 08:36:11.784 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 734 08:36:11.784 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 735 08:36:11.784 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405449, seq# expected = 2296405449 736 08:37:32.370 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405449 737 08:37:32.370 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 738 08:37:32.400 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 739 08:37:32.400 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 740 08:37:32.400 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405450, seq# expected = 2296405450 741 08:38:27.950 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405450 742 08:38:27.950 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 743 08:38:27.980 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 744 08:38:27.980 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 745 08:38:27.980 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405451, seq# expected = 2296405451 746 08:39:02.500 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 747 08:39:28.537 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405451 748 08:39:28.537 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 749 08:39:28.567 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 750 08:39:28.567 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 751 08:39:28.567 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405452, seq# expected = 2296405452 752 08:40:24.117 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405452 753 08:40:24.117 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 754 08:40:24.147 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 755 08:40:24.147 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 756 08:40:24.147 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405453, seq# expected = 2296405453 757 08:42:24.791 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405453 758 08:42:24.791 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 759 08:42:24.851 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 760 08:42:24.851 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 761 08:42:24.851 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405454, seq# expected = 2296405454 762 08:44:02.932 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 763 08:44:25.965 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405454 764 08:44:25.965 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 765 08:44:25.995 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 766 08:44:25.995 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 767 08:44:25.995 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405455, seq# expected = 2296405455 768 08:49:03.864 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 769 08:51:12.049 04/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2296405455 770 08:51:12.049 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 771 08:51:12.079 04/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 772 08:51:12.079 04/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 773 08:51:12.079 04/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2296405456, seq# expected = 2296405456 774 08:54:04.296 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 775 08:59:04.728 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 776 09:04:04.660 04/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1081, dst port 4005 777 09:05:25.286 04/14/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 778 09:05:25.286 04/14/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 779 09:05:25.286 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 780 09:05:25.286 04/14/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 197B413D INBOUND SPI = AE472C58) 781 09:05:25.286 04/14/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=01F575EC 782 09:05:25.286 04/14/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F506F35094783308 R_Cookie=93D025DB67FB66EC) reason = DEL_REASON_RESET_SADB 783 09:05:25.286 04/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 784 09:05:25.286 04/14/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F506F35094783308 R_Cookie=93D025DB67FB66EC) reason = DEL_REASON_RESET_SADB 785 09:05:25.286 04/14/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 786 09:05:25.286 04/14/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 787 09:05:25.286 04/14/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 788 09:05:25.286 04/14/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1081 for TCP connection. 789 09:05:25.286 04/14/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 12:31:54 790 09:05:25.296 04/14/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 791 09:05:26.818 04/14/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 792 09:05:26.828 04/14/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 793 09:05:26.828 04/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x582c47ae 794 09:05:26.838 04/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x582c47ae 795 09:05:26.838 04/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3d417b19 796 09:05:26.838 04/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3d417b19 797 09:05:26.838 04/14/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1081, dst port 4005 798 09:05:26.838 04/14/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 799 09:05:26.838 04/14/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 800 09:05:26.838 04/14/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 801 09:05:26.838 04/14/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys