EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 20:02:03.237 04/15/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 20:02:03.277 04/15/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 20:02:03.277 04/15/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 20:02:03.307 04/15/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1075 for TCP connection. 5 20:02:03.478 04/15/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 20:02:03.478 04/15/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 20:02:03.478 04/15/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1075, dst port 4005 8 20:02:03.478 04/15/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1075 9 20:02:03.478 04/15/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1075, dst port 4005 10 20:02:03.478 04/15/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 20:02:03.988 04/15/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 20:02:04.028 04/15/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 20:02:04.249 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 20:02:04.439 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 20:02:04.439 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 20:02:04.439 04/15/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 20:02:04.439 04/15/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 20:02:04.439 04/15/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 20:02:04.439 04/15/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 20:02:04.459 04/15/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 20:02:04.459 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 20:02:04.459 04/15/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 20:02:04.459 04/15/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 20:02:04.499 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 20:02:04.499 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 20:02:04.499 04/15/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 20:02:04.499 04/15/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=F3E777599CD593C5 R_Cookie=CBB79795725EDB79) reason = DEL_REASON_LOAD_BALANCING 28 20:02:04.499 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 20:02:05.481 04/15/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=F3E777599CD593C5 R_Cookie=CBB79795725EDB79) reason = DEL_REASON_LOAD_BALANCING 30 20:02:05.481 04/15/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 20:02:05.481 04/15/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 20:02:05.481 04/15/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 20:02:05.491 04/15/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 20:02:05.501 04/15/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1075, dst port 4005 35 20:02:05.501 04/15/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1075, dst port 4005 36 20:02:06.482 04/15/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1075 37 20:02:06.482 04/15/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1075, dst port 4005 38 20:02:06.482 04/15/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 20:02:06.983 04/15/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 20:02:07.003 04/15/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 20:02:07.023 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 20:02:07.203 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 20:02:07.203 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 20:02:07.203 04/15/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 20:02:07.203 04/15/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 20:02:07.203 04/15/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 20:02:07.203 04/15/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 20:02:07.213 04/15/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 20:02:07.213 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 20:02:07.213 04/15/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 20:02:07.213 04/15/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 20:02:07.243 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 20:02:07.243 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 20:02:07.243 04/15/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 20:02:22.685 04/15/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 20:02:22.685 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 20:02:25.159 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 20:02:25.159 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 20:02:25.159 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 20:02:25.159 04/15/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 20:02:25.239 04/15/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 20:02:25.239 04/15/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 20:02:25.239 04/15/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 20:02:25.239 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 20:02:26.230 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.130 68 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 20:02:26.230 04/15/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 20:02:26.341 04/15/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 20:02:26.351 04/15/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.130, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 20:02:26.351 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 20:02:26.351 04/15/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 20:02:26.351 04/15/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 20:02:31.518 04/15/07 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 86 20:02:31.518 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(Retransmission) to 137.69.115.16 87 20:02:31.558 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 20:02:31.558 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 20:02:31.558 04/15/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 90 20:02:31.558 04/15/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 24 seconds, setting expiry to 86376 seconds from now 91 20:02:31.568 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 92 20:02:31.568 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 93 20:02:31.568 04/15/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 94 20:02:31.568 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 95 20:02:31.568 04/15/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=19F2FD2E OUTBOUND SPI = 0x3D926E1A INBOUND SPI = 0x10BD0582) 96 20:02:31.568 04/15/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3D926E1A 97 20:02:31.568 04/15/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x10BD0582 98 20:02:34.592 04/15/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.130/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 99 20:02:34.673 04/15/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 100 20:02:34.723 04/15/07 Sev=Info/4 CM/0x6310001A One secure connection established 101 20:02:34.783 04/15/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.13.8.130, 192.168.5.1. 102 20:02:34.783 04/15/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.130. Current address(es): 192.168.1.102, 10.13.8.130, 192.168.5.1. 103 20:02:35.023 04/15/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 20:02:35.023 04/15/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x1a6e923d into key list 105 20:02:35.023 04/15/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 106 20:02:35.023 04/15/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x8205bd10 into key list 107 20:02:35.023 04/15/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.130 108 20:02:36.525 04/15/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x1a6e923d for inbound key with SPI=0x8205bd10 109 20:04:01.147 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185335 110 20:04:01.147 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 111 20:04:01.177 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 112 20:04:01.177 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 113 20:04:01.177 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185336, seq# expected = 2268185336 114 20:04:16.669 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185336 115 20:04:16.669 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 116 20:04:16.699 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 117 20:04:16.699 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 118 20:04:16.699 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185337, seq# expected = 2268185337 119 20:05:02.235 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185337 120 20:05:02.235 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 121 20:05:02.265 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 122 20:05:02.265 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 123 20:05:02.265 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185338, seq# expected = 2268185338 124 20:05:37.786 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185338 125 20:05:37.786 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 126 20:05:37.816 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 127 20:05:37.816 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 128 20:05:37.816 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185339, seq# expected = 2268185339 129 20:07:07.415 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 130 20:10:08.675 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185339 131 20:10:08.675 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 132 20:10:08.705 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 133 20:10:08.705 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 134 20:10:08.705 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185340, seq# expected = 2268185340 135 20:10:24.198 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185340 136 20:10:24.198 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 137 20:10:24.228 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 138 20:10:24.228 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 139 20:10:24.228 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185341, seq# expected = 2268185341 140 20:10:44.727 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185341 141 20:10:44.727 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 142 20:10:44.757 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 143 20:10:44.757 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 144 20:10:44.757 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185342, seq# expected = 2268185342 145 20:10:55.242 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185342 146 20:10:55.242 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 147 20:10:55.272 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 148 20:10:55.272 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 149 20:10:55.272 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185343, seq# expected = 2268185343 150 20:11:05.757 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185343 151 20:11:05.757 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 152 20:11:05.787 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 153 20:11:05.787 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 154 20:11:05.787 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185344, seq# expected = 2268185344 155 20:12:07.847 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 156 20:12:31.381 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185344 157 20:12:31.381 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 158 20:12:31.411 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 159 20:12:31.411 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 160 20:12:31.411 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185345, seq# expected = 2268185345 161 20:16:27.220 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185345 162 20:16:27.220 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 163 20:16:27.250 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 164 20:16:27.250 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 165 20:16:27.250 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185346, seq# expected = 2268185346 166 20:17:08.279 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 167 20:18:54.619 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185346 168 20:18:54.619 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 169 20:18:54.649 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 170 20:18:54.649 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 171 20:18:54.649 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185347, seq# expected = 2268185347 172 20:22:09.595 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 173 20:22:22.560 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185347 174 20:22:22.560 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 175 20:22:22.590 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 176 20:22:22.590 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 177 20:22:22.590 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185348, seq# expected = 2268185348 178 20:23:49.123 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185348 179 20:23:49.123 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 180 20:23:49.163 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 181 20:23:49.163 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 182 20:23:49.163 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185349, seq# expected = 2268185349 183 20:24:34.688 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185349 184 20:24:34.688 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 185 20:24:34.718 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 186 20:24:34.718 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 187 20:24:34.718 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185350, seq# expected = 2268185350 188 20:25:00.225 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185350 189 20:25:00.225 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 190 20:25:00.255 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 191 20:25:00.255 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 192 20:25:00.255 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185351, seq# expected = 2268185351 193 20:27:08.910 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 194 20:28:05.992 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185351 195 20:28:05.992 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 196 20:28:06.022 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 197 20:28:06.022 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 198 20:28:06.022 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185352, seq# expected = 2268185352 199 20:30:51.780 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185352 200 20:30:51.780 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 201 20:30:51.810 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 202 20:30:51.810 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 203 20:30:51.810 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185353, seq# expected = 2268185353 204 20:31:22.324 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185353 205 20:31:22.324 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 20:31:22.354 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 20:31:22.354 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 20:31:22.354 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185354, seq# expected = 2268185354 209 20:32:09.392 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 210 20:37:09.426 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 211 20:37:38.472 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185354 212 20:37:38.472 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 213 20:37:38.502 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 214 20:37:38.502 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 215 20:37:38.502 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185355, seq# expected = 2268185355 216 20:39:14.126 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185355 217 20:39:14.126 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 20:39:14.156 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 20:39:14.156 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 20:39:14.156 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185356, seq# expected = 2268185356 221 20:41:19.844 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185356 222 20:41:19.844 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 223 20:41:19.874 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 224 20:41:19.874 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 225 20:41:19.874 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185357, seq# expected = 2268185357 226 20:41:55.400 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185357 227 20:41:55.400 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 228 20:41:55.430 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 229 20:41:55.430 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 230 20:41:55.430 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185358, seq# expected = 2268185358 231 20:42:09.922 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 232 20:47:10.560 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 233 20:50:01.827 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185358 234 20:50:01.827 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 235 20:50:01.857 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 236 20:50:01.857 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 237 20:50:01.857 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185359, seq# expected = 2268185359 238 20:52:11.023 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 239 20:54:57.686 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185359 240 20:54:57.686 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 241 20:54:57.716 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 242 20:54:57.716 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 243 20:54:57.716 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185360, seq# expected = 2268185360 244 20:57:10.821 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 245 21:02:11.244 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 246 21:04:58.980 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185360 247 21:04:58.980 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 248 21:04:59.010 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 249 21:04:59.010 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 250 21:04:59.010 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185361, seq# expected = 2268185361 251 21:06:59.650 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185361 252 21:06:59.650 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 253 21:06:59.690 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 254 21:06:59.690 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 255 21:06:59.690 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185362, seq# expected = 2268185362 256 21:07:11.667 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 257 21:12:12.611 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 258 21:17:12.549 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 259 21:18:56.197 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185362 260 21:18:56.197 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 261 21:18:56.227 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 262 21:18:56.227 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 263 21:18:56.227 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185363, seq# expected = 2268185363 264 21:20:01.791 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185363 265 21:20:01.791 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 266 21:20:01.821 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 267 21:20:01.821 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 268 21:20:01.821 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185364, seq# expected = 2268185364 269 21:22:13.018 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 270 21:27:13.446 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 271 21:30:53.759 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185364 272 21:30:53.759 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 273 21:30:53.789 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 274 21:30:53.789 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 275 21:30:53.789 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185365, seq# expected = 2268185365 276 21:32:13.873 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 277 21:34:59.610 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185365 278 21:34:59.610 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 279 21:34:59.650 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 280 21:34:59.650 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 281 21:34:59.650 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185366, seq# expected = 2268185366 282 21:37:14.803 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 283 21:42:15.232 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 284 21:42:50.783 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185366 285 21:42:50.783 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 286 21:42:50.813 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 287 21:42:50.813 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 288 21:42:50.813 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185367, seq# expected = 2268185367 289 21:47:15.656 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 290 21:49:57.887 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185367 291 21:49:57.887 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 292 21:49:57.947 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 293 21:49:57.947 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 294 21:49:57.947 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185368, seq# expected = 2268185368 295 21:52:15.583 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 296 21:57:16.513 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 297 22:02:16.942 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 298 22:04:59.674 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185368 299 22:04:59.674 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 300 22:04:59.704 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 301 22:04:59.704 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 302 22:04:59.704 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185369, seq# expected = 2268185369 303 22:07:17.371 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 304 22:08:05.440 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185369 305 22:08:05.440 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 306 22:08:05.470 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 307 22:08:05.470 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 308 22:08:05.470 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185370, seq# expected = 2268185370 309 22:12:17.800 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 310 22:17:16.727 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185370 311 22:17:16.727 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 312 22:17:16.757 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 313 22:17:16.757 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 314 22:17:16.757 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185371, seq# expected = 2268185371 315 22:17:18.229 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 316 22:20:02.463 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185371 317 22:20:02.463 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 318 22:20:02.494 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 319 22:20:02.494 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 320 22:20:02.494 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185372, seq# expected = 2268185372 321 22:22:18.658 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 322 22:26:58.558 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185372 323 22:26:58.558 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 324 22:26:58.588 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 325 22:26:58.588 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 326 22:26:58.588 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185373, seq# expected = 2268185373 327 22:27:18.586 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 328 22:32:19.516 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 329 22:34:59.756 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185373 330 22:34:59.756 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 331 22:34:59.816 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 332 22:34:59.816 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 333 22:34:59.816 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185374, seq# expected = 2268185374 334 22:37:19.990 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 335 22:38:55.650 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185374 336 22:38:55.650 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 337 22:38:55.680 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 338 22:38:55.680 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 339 22:38:55.680 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185375, seq# expected = 2268185375 340 22:42:20.465 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 341 22:47:20.924 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 342 22:50:02.170 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185375 343 22:50:02.170 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 344 22:50:02.200 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 345 22:50:02.200 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 346 22:50:02.200 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185376, seq# expected = 2268185376 347 22:50:57.755 04/15/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2268185376 348 22:50:57.755 04/15/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 349 22:50:57.785 04/15/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 350 22:50:57.785 04/15/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 351 22:50:57.785 04/15/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2268185377, seq# expected = 2268185377 352 22:52:20.859 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 353 22:57:21.734 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 354 23:02:22.178 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 355 23:07:22.622 04/15/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1075, dst port 4005 356 08:02:33.731 04/16/07 Sev=Warning/2 CVPND/0xA3400011 Error -16 sending packet. Dst Addr: 0x89457310, Src Addr: 0x00000000 (DRVIFACE:2529). 357 08:02:33.731 04/16/07 Sev=Info/4 CM/0x6310002C Unable to send a TCP heartbeat 358 08:02:33.731 04/16/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 359 08:02:33.731 04/16/07 Sev=Warning/3 IKE/0xE3000068 Failed to send 68 bytes to 137.69.115.16, error = 0xFFFFFFF0 360 08:02:33.731 04/16/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3D926E1A INBOUND SPI = 10BD0582) 361 08:02:33.731 04/16/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=19F2FD2E 362 08:02:33.771 04/16/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x8205bd10 363 08:02:33.771 04/16/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x8205bd10 364 08:02:33.771 04/16/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x1a6e923d 365 08:02:33.771 04/16/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x1a6e923d 366 08:02:35.854 04/16/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 367 08:02:35.854 04/16/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.130, GW IP = 0.0.0.0, Remote IP = 137.69.36.24 368 08:02:35.854 04/16/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 369 08:02:38.458 04/16/07 Sev=Warning/3 CM/0xA310002C Adapter address changed from 192.168.1.102. Current address(es): 10.13.8.130, 192.168.5.1. 370 08:02:38.458 04/16/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 371 08:02:38.458 04/16/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 372 08:02:38.458 04/16/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=4189056B 373 08:02:38.458 04/16/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E72E5F8BDF155440 R_Cookie=199022017E50F6EF) reason = DEL_REASON_ADDRESS_CHANGE 374 08:02:38.458 04/16/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 375 08:02:38.458 04/16/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E72E5F8BDF155440 R_Cookie=199022017E50F6EF) reason = DEL_REASON_ADDRESS_CHANGE 376 08:02:38.458 04/16/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_ADDRESS_CHANGE. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 377 08:02:38.458 04/16/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 378 08:02:38.458 04/16/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 379 08:02:38.458 04/16/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1075 for TCP connection. 380 08:02:38.458 04/16/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 12:0:4 381 08:02:39.629 04/16/07 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 382 08:02:39.629 04/16/07 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 383 08:02:39.629 04/16/07 Sev=Warning/2 CVPND/0xA340000E Failed to get adapter index. 384 08:02:39.629 04/16/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 385 08:03:00.700 04/16/07 Sev=Warning/2 CM/0xA310002E Failed to disable the virtual adapter. 386 08:03:00.710 04/16/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 387 08:03:00.720 04/16/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1075, dst port 4005 388 08:03:00.720 04/16/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x00000000 389 08:03:00.720 04/16/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 390 08:03:00.720 04/16/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 391 08:03:00.720 04/16/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 392 08:03:00.720 04/16/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys