EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 14:34:20.658 06/24/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 14:34:20.708 06/24/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 14:34:20.708 06/24/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 14:34:20.738 06/24/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1070 for TCP connection. 5 14:34:20.898 06/24/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 14:34:20.898 06/24/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 14:34:20.898 06/24/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1070, dst port 4005 8 14:34:20.898 06/24/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1070 9 14:34:20.898 06/24/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1070, dst port 4005 10 14:34:20.898 06/24/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 14:34:21.399 06/24/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 14:34:21.419 06/24/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 14:34:21.469 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 14:34:21.699 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 14:34:21.699 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 14:34:21.699 06/24/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 14:34:21.699 06/24/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 14:34:21.699 06/24/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 14:34:21.699 06/24/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 14:34:21.719 06/24/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 14:34:21.719 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 14:34:21.719 06/24/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 14:34:21.719 06/24/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 14:34:21.799 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 14:34:21.799 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 14:34:21.799 06/24/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 14:34:21.799 06/24/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=A3EE93627C377CD3 R_Cookie=691B7984EC905716) reason = DEL_REASON_LOAD_BALANCING 28 14:34:21.809 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 14:34:22.400 06/24/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=A3EE93627C377CD3 R_Cookie=691B7984EC905716) reason = DEL_REASON_LOAD_BALANCING 30 14:34:22.400 06/24/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 14:34:22.400 06/24/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 14:34:22.400 06/24/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 14:34:22.410 06/24/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 14:34:22.901 06/24/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1070, dst port 4005 35 14:34:22.901 06/24/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1070, dst port 4005 36 14:34:22.901 06/24/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1070 37 14:34:22.901 06/24/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1070, dst port 4005 38 14:34:22.901 06/24/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 14:34:23.402 06/24/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 14:34:23.422 06/24/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 14:34:23.442 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 14:34:23.672 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 14:34:23.672 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 14:34:23.672 06/24/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 14:34:23.672 06/24/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 14:34:23.672 06/24/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 14:34:23.672 06/24/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 14:34:23.682 06/24/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 14:34:23.682 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 14:34:23.682 06/24/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 14:34:23.682 06/24/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 14:34:23.772 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 14:34:23.772 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 14:34:23.772 06/24/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 14:34:35.429 06/24/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 14:34:35.429 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 14:34:38.003 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 14:34:38.003 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 14:34:38.003 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 14:34:38.003 06/24/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 14:34:38.093 06/24/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 14:34:38.093 06/24/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 14:34:38.093 06/24/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 14:34:38.093 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 14:34:39.144 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 14:34:39.144 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.79 68 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 14:34:39.154 06/24/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 14:34:39.164 06/24/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 14:34:39.184 06/24/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.79, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 14:34:39.184 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 14:34:39.184 06/24/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 14:34:39.184 06/24/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 14:34:39.274 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 14:34:39.274 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 14:34:39.274 06/24/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 14:34:39.274 06/24/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 16 seconds, setting expiry to 86384 seconds from now 89 14:34:39.284 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 14:34:39.284 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 14:34:39.284 06/24/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 14:34:39.284 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 14:34:39.284 06/24/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=07023B4C OUTBOUND SPI = 0x66B63A04 INBOUND SPI = 0x66BF3673) 94 14:34:39.284 06/24/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x66B63A04 95 14:34:39.284 06/24/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x66BF3673 96 14:34:41.898 06/24/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.79/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 14:34:41.928 06/24/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 14:34:41.948 06/24/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 14:34:42.008 06/24/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.143. Current address(es): 192.168.1.143, 10.13.8.79, 192.168.186.1, 192.168.121.1. 100 14:34:42.008 06/24/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.79. Current address(es): 192.168.1.143, 10.13.8.79, 192.168.186.1, 192.168.121.1. 101 14:34:42.249 06/24/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 14:34:42.249 06/24/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x043ab666 into key list 103 14:34:42.249 06/24/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 14:34:42.249 06/24/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7336bf66 into key list 105 14:34:42.249 06/24/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.79 106 14:34:44.933 06/24/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x043ab666 for inbound key with SPI=0x7336bf66 107 14:37:04.633 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853978 108 14:37:04.633 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 14:37:04.714 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 14:37:04.714 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 14:37:04.714 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853979, seq# expected = 3357853979 112 14:39:23.884 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 113 14:42:53.685 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853979 114 14:42:53.685 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 115 14:42:53.776 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 116 14:42:53.776 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 117 14:42:53.776 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853980, seq# expected = 3357853980 118 14:43:29.737 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853980 119 14:43:29.737 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 120 14:43:29.827 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 121 14:43:29.827 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 122 14:43:29.827 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853981, seq# expected = 3357853981 123 14:44:24.816 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 124 14:49:25.258 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 125 14:51:31.811 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853981 126 14:51:31.811 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 127 14:51:31.901 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 128 14:51:31.901 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 129 14:51:31.901 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853982, seq# expected = 3357853982 130 14:54:25.349 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 131 14:59:25.847 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 132 15:03:27.705 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853982 133 15:03:27.705 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 134 15:03:27.815 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 135 15:03:27.815 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 136 15:03:27.815 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853983, seq# expected = 3357853983 137 15:04:25.798 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 138 15:07:10.036 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853983 139 15:07:10.036 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 140 15:07:10.116 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 141 15:07:10.116 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 142 15:07:10.116 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853984, seq# expected = 3357853984 143 15:09:26.266 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 144 15:14:27.254 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 145 15:19:28.240 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 146 15:24:28.210 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 147 15:27:27.868 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853984 148 15:27:27.868 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 149 15:27:27.948 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 150 15:27:27.948 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 151 15:27:27.948 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853985, seq# expected = 3357853985 152 15:29:28.468 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 153 15:34:28.894 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 154 15:39:29.821 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 155 15:44:29.780 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 156 15:49:30.215 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 157 15:51:33.892 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853985 158 15:51:33.892 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 159 15:51:33.972 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 160 15:51:33.982 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 161 15:51:33.982 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853986, seq# expected = 3357853986 162 15:54:30.644 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 163 15:59:31.091 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 164 16:03:34.001 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853986 165 16:03:34.001 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 166 16:03:34.081 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 16:03:34.081 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 168 16:03:34.091 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853987, seq# expected = 3357853987 169 16:04:31.085 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 170 16:09:32.527 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 171 16:14:32.478 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 172 16:18:53.844 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853987 173 16:18:53.844 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 174 16:18:53.934 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 175 16:18:53.934 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 176 16:18:53.934 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853988, seq# expected = 3357853988 177 16:19:32.395 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 178 16:23:38.246 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853988 179 16:23:38.246 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 180 16:23:38.366 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 181 16:23:38.366 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 182 16:23:38.366 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853989, seq# expected = 3357853989 183 16:24:32.825 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 184 16:29:34.281 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 185 16:30:51.884 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853989 186 16:30:51.884 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 187 16:30:51.964 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 188 16:30:51.964 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 189 16:30:51.964 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853990, seq# expected = 3357853990 190 16:34:34.706 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 191 16:38:24.037 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853990 192 16:38:24.037 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 193 16:38:29.535 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853991 194 16:38:29.535 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 195 16:38:29.625 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 196 16:38:29.625 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 197 16:38:29.625 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853992, seq# expected = 3357853992 198 16:39:34.137 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 199 16:42:50.410 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853992 200 16:42:50.410 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 201 16:42:50.500 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 202 16:42:50.500 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 203 16:42:50.500 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853993, seq# expected = 3357853993 204 16:44:35.060 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 205 16:49:35.994 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 206 16:54:35.980 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 207 16:59:36.431 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 208 17:04:36.872 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 209 17:06:55.572 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853993 210 17:06:55.572 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 211 17:06:55.662 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 212 17:06:55.662 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 213 17:06:55.662 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853994, seq# expected = 3357853994 214 17:09:37.303 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 215 17:11:50.979 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853994 216 17:11:50.979 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 217 17:11:51.059 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 218 17:11:51.059 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 219 17:11:51.059 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853995, seq# expected = 3357853995 220 17:14:38.243 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 221 17:18:54.116 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853995 222 17:18:54.116 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 223 17:18:54.206 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 224 17:18:54.206 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 225 17:18:54.206 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853996, seq# expected = 3357853996 226 17:19:37.690 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 227 17:24:38.628 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 228 17:26:08.758 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853996 229 17:26:08.758 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 17:26:08.838 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 231 17:26:08.838 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 232 17:26:08.838 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853997, seq# expected = 3357853997 233 17:29:39.073 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 234 17:34:39.511 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 235 17:39:39.959 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 236 17:44:40.392 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 237 17:49:40.329 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 238 17:54:41.267 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 239 17:59:42.206 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 240 18:04:42.153 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 241 18:09:42.612 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 242 18:14:43.039 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 243 18:19:42.969 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 244 18:24:43.904 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 245 18:29:44.349 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 246 18:34:23.754 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853997 247 18:34:23.754 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 248 18:34:23.854 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 249 18:34:23.854 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 250 18:34:23.854 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853998, seq# expected = 3357853998 251 18:34:44.294 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 252 18:38:45.142 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853998 253 18:38:45.142 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 254 18:38:45.233 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 255 18:38:45.233 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 256 18:38:45.233 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357853999, seq# expected = 3357853999 257 18:39:44.739 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 258 18:42:57.508 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357853999 259 18:42:57.508 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 260 18:42:57.598 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 261 18:42:57.598 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 262 18:42:57.598 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854000, seq# expected = 3357854000 263 18:44:45.174 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 264 18:49:46.118 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 265 18:50:58.711 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854000 266 18:50:58.711 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 267 18:50:58.801 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 268 18:50:58.801 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 269 18:50:58.801 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854001, seq# expected = 3357854001 270 18:54:47.036 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 271 18:59:46.971 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 272 19:04:47.916 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 273 19:09:47.861 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 274 19:14:48.786 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 275 19:19:48.721 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 276 19:24:49.162 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 277 19:28:52.036 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854001 278 19:28:52.036 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 279 19:28:52.126 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 280 19:28:52.126 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 281 19:28:52.126 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854002, seq# expected = 3357854002 282 19:29:49.119 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 283 19:34:49.557 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 284 19:39:50.496 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 285 19:42:56.266 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854002 286 19:42:56.266 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 19:42:56.357 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 19:42:56.357 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 19:42:56.357 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854003, seq# expected = 3357854003 290 19:44:50.443 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 291 19:49:51.372 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 292 19:54:51.810 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 293 19:54:55.315 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854003 294 19:54:55.315 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 295 19:54:55.395 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 296 19:54:55.395 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 297 19:54:55.395 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854004, seq# expected = 3357854004 298 19:59:52.745 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 299 20:04:53.180 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 300 20:06:56.370 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854004 301 20:06:56.370 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 302 20:06:56.450 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 303 20:06:56.450 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 304 20:06:56.450 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854005, seq# expected = 3357854005 305 20:09:53.118 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 306 20:14:54.056 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 307 20:18:56.420 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854005 308 20:18:56.420 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 309 20:18:56.500 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 310 20:18:56.500 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 311 20:18:56.500 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854006, seq# expected = 3357854006 312 20:19:53.513 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 313 20:24:53.941 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 314 20:29:54.389 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 315 20:30:50.461 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854006 316 20:30:50.461 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 317 20:30:50.541 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 318 20:30:50.541 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 319 20:30:50.541 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854007, seq# expected = 3357854007 320 20:31:00.976 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854007 321 20:31:00.976 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 322 20:31:01.066 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 323 20:31:01.066 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 324 20:31:01.066 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854008, seq# expected = 3357854008 325 20:34:54.817 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 326 20:38:56.669 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854008 327 20:38:56.669 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 328 20:38:56.750 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 329 20:38:56.750 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 330 20:38:56.750 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854009, seq# expected = 3357854009 331 20:39:55.255 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 332 20:42:58.522 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854009 333 20:42:58.522 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 334 20:42:58.602 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 335 20:42:58.602 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 336 20:42:58.602 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854010, seq# expected = 3357854010 337 20:44:55.703 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 338 20:49:56.632 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 339 20:54:56.569 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 340 20:54:59.072 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854010 341 20:54:59.072 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 342 20:54:59.153 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 343 20:54:59.153 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 344 20:54:59.153 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854011, seq# expected = 3357854011 345 20:59:02.928 06/24/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x043ab666 is about to expire, requesting a new one 346 20:59:02.928 06/24/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.79, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 347 20:59:02.928 06/24/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=2C424BC6) Initiator = ID=10.13.8.79 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 348 20:59:02.928 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 349 20:59:03.018 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 350 20:59:03.028 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 351 20:59:03.028 06/24/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 352 20:59:03.028 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 353 20:59:03.028 06/24/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=2C424BC6 OUTBOUND SPI = 0x6AE060CF INBOUND SPI = 0x2608E64A) 354 20:59:03.028 06/24/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x6AE060CF 355 20:59:03.028 06/24/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x2608E64A 356 20:59:03.028 06/24/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 357 20:59:03.449 06/24/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 358 20:59:03.449 06/24/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xcf60e06a into key list 359 20:59:03.449 06/24/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 360 20:59:03.449 06/24/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4ae60826 into key list 361 20:59:33.012 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 362 20:59:33.012 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 363 20:59:33.012 06/24/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 66B63A04 INBOUND SPI = 66BF3673) 364 20:59:33.012 06/24/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=07023B4C 365 20:59:33.483 06/24/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7336bf66 366 20:59:33.493 06/24/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7336bf66 367 20:59:33.493 06/24/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x043ab666 368 20:59:33.493 06/24/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x043ab666 369 20:59:57.007 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 370 21:00:03.026 06/24/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xcf60e06a for inbound key with SPI=0x4ae60826 371 21:04:57.455 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 372 21:06:59.105 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854011 373 21:06:59.105 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 374 21:06:59.195 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 375 21:06:59.195 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 376 21:06:59.195 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854012, seq# expected = 3357854012 377 21:09:58.330 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 378 21:13:56.653 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854012 379 21:13:56.653 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 380 21:13:56.743 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 381 21:13:56.743 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 382 21:13:56.743 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854013, seq# expected = 3357854013 383 21:14:58.237 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 384 21:19:01.570 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854013 385 21:19:01.570 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 386 21:19:01.691 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 387 21:19:01.691 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 388 21:19:01.691 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854014, seq# expected = 3357854014 389 21:19:58.648 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 390 21:24:59.560 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 391 21:29:59.971 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 392 21:31:04.559 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854014 393 21:31:04.559 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 394 21:31:04.650 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 21:31:04.650 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 396 21:31:04.650 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854015, seq# expected = 3357854015 397 21:35:00.382 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 398 21:40:00.793 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 399 21:43:05.045 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854015 400 21:43:05.045 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 401 21:43:05.125 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 402 21:43:05.125 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 403 21:43:05.125 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854016, seq# expected = 3357854016 404 21:45:00.713 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 405 21:50:02.126 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 406 21:55:02.036 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 407 22:00:02.447 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 408 22:05:02.357 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 409 22:07:05.526 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854016 410 22:07:05.526 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 411 22:07:05.616 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 412 22:07:05.616 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 413 22:07:05.616 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854017, seq# expected = 3357854017 414 22:10:03.269 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 415 22:15:03.179 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 416 22:19:11.019 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854017 417 22:19:11.019 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 418 22:19:11.129 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 419 22:19:11.139 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 420 22:19:11.139 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854018, seq# expected = 3357854018 421 22:20:03.600 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 422 22:22:31.793 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854018 423 22:22:31.793 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 424 22:22:31.883 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 425 22:22:31.883 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 426 22:22:31.883 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854019, seq# expected = 3357854019 427 22:22:42.308 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854019 428 22:22:42.308 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 429 22:22:42.398 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 430 22:22:42.398 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 431 22:22:42.398 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854020, seq# expected = 3357854020 432 22:25:04.502 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 433 22:30:04.913 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 434 22:35:05.825 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 435 22:39:10.660 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854020 436 22:39:10.660 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 437 22:39:10.740 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 438 22:39:10.740 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 439 22:39:10.740 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854021, seq# expected = 3357854021 440 22:40:05.234 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 441 22:45:06.156 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 442 22:46:23.752 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854021 443 22:46:23.752 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 444 22:46:23.832 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 445 22:46:23.832 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 446 22:46:23.832 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854022, seq# expected = 3357854022 447 22:50:06.557 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 448 22:55:06.978 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 449 23:00:07.379 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 450 23:02:26.069 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854022 451 23:02:26.069 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 452 23:02:26.149 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 453 23:02:26.149 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 454 23:02:26.149 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854023, seq# expected = 3357854023 455 23:05:07.790 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 456 23:10:08.211 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 457 23:15:08.632 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 458 23:19:05.446 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854023 459 23:19:05.446 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 460 23:19:05.536 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 461 23:19:05.536 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 462 23:19:05.536 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854024, seq# expected = 3357854024 463 23:20:08.532 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 464 23:25:09.444 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 465 23:30:09.865 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 466 23:35:10.276 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 467 23:40:10.687 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 468 23:43:10.433 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854024 469 23:43:10.433 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 470 23:43:10.523 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 471 23:43:10.523 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 472 23:43:10.523 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854025, seq# expected = 3357854025 473 23:45:10.597 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 474 23:50:11.519 06/24/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 475 23:55:11.429 06/24/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854025 476 23:55:11.429 06/24/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 477 23:55:11.530 06/24/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 478 23:55:11.530 06/24/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 479 23:55:11.530 06/24/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854026, seq# expected = 3357854026 480 00:00:12.852 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 481 00:05:12.261 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 482 00:07:07.419 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854026 483 00:07:07.419 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 484 00:07:07.499 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 485 00:07:07.499 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 486 00:07:07.499 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854027, seq# expected = 3357854027 487 00:10:12.672 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 488 00:12:36.369 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854027 489 00:12:36.369 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 490 00:12:36.459 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 491 00:12:36.459 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 492 00:12:36.459 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854028, seq# expected = 3357854028 493 00:15:13.094 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 494 00:19:09.417 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854028 495 00:19:09.417 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 496 00:19:09.497 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 497 00:19:09.497 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 498 00:19:09.497 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854029, seq# expected = 3357854029 499 00:20:13.515 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 500 00:25:13.926 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 501 00:30:14.867 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 502 00:35:15.268 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 503 00:39:23.608 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854029 504 00:39:23.608 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 505 00:39:23.688 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 506 00:39:23.688 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 507 00:39:23.688 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854030, seq# expected = 3357854030 508 00:40:15.179 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 509 00:43:05.922 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854030 510 00:43:05.922 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 511 00:43:06.032 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 512 00:43:06.032 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 513 00:43:06.032 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854031, seq# expected = 3357854031 514 00:45:15.700 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 515 00:46:36.731 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854031 516 00:46:36.731 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 517 00:46:36.811 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 518 00:46:36.811 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 519 00:46:36.811 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854032, seq# expected = 3357854032 520 00:50:16.531 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 521 00:55:05.427 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854032 522 00:55:05.427 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 523 00:55:05.507 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 524 00:55:05.507 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 525 00:55:05.507 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854033, seq# expected = 3357854033 526 00:55:16.442 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 527 01:00:17.373 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 528 01:05:17.784 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 529 01:07:06.433 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854033 530 01:07:06.433 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 531 01:07:06.513 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 532 01:07:06.513 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 533 01:07:06.513 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854034, seq# expected = 3357854034 534 01:10:18.195 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 535 01:15:18.606 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 536 01:19:10.423 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854034 537 01:19:10.423 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 538 01:19:10.514 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 539 01:19:10.514 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 540 01:19:10.514 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854035, seq# expected = 3357854035 541 01:20:18.517 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 542 01:25:02.405 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854035 543 01:25:02.405 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 544 01:25:02.495 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 545 01:25:02.495 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 546 01:25:02.495 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854036, seq# expected = 3357854036 547 01:25:18.928 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 548 01:30:20.340 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 549 01:31:08.906 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854036 550 01:31:08.906 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 551 01:31:08.987 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 552 01:31:08.987 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 553 01:31:08.987 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854037, seq# expected = 3357854037 554 01:40:20.702 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 555 01:43:08.672 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854037 556 01:43:08.672 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 557 01:43:08.763 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 558 01:43:08.763 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 559 01:43:08.763 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854038, seq# expected = 3357854038 560 01:45:20.912 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 561 01:50:21.324 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 562 01:55:21.745 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 563 02:00:22.156 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 564 02:00:49.694 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854038 565 02:00:49.694 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 566 02:00:49.774 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 567 02:00:49.774 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 568 02:00:49.774 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854039, seq# expected = 3357854039 569 02:05:22.577 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 570 02:10:22.498 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 571 02:15:23.399 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 572 02:19:09.709 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854039 573 02:19:09.709 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 574 02:19:09.829 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 575 02:19:09.829 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 576 02:19:09.829 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854040, seq# expected = 3357854040 577 02:20:23.310 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 578 02:25:23.721 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 579 02:30:24.132 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 580 02:30:54.183 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854040 581 02:30:54.183 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 582 02:30:54.263 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 583 02:30:54.263 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 584 02:30:54.263 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854041, seq# expected = 3357854041 585 02:35:25.053 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 586 02:39:32.392 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854041 587 02:39:32.392 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 588 02:39:32.502 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 589 02:39:32.502 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 590 02:39:32.502 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854042, seq# expected = 3357854042 591 02:39:52.920 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854042 592 02:39:52.920 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 593 02:39:53.010 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 594 02:39:53.010 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 595 02:39:53.010 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854043, seq# expected = 3357854043 596 02:40:24.964 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 597 02:45:25.875 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 598 02:50:26.538 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 599 02:55:26.069 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 600 03:00:27.017 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 601 03:05:26.963 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 602 03:10:27.420 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 603 03:15:27.867 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 604 03:20:28.314 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 605 03:23:09.564 06/25/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xcf60e06a is about to expire, requesting a new one 606 03:23:09.564 06/25/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.79, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 607 03:23:09.574 06/25/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=77D34A89) Initiator = ID=10.13.8.79 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 608 03:23:09.574 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 609 03:23:09.665 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 610 03:23:09.665 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 611 03:23:09.665 06/25/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 612 03:23:09.665 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 613 03:23:09.665 06/25/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=77D34A89 OUTBOUND SPI = 0x742A403C INBOUND SPI = 0x1BC051AB) 614 03:23:09.665 06/25/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x742A403C 615 03:23:09.665 06/25/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x1BC051AB 616 03:23:09.665 06/25/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 617 03:23:10.075 06/25/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 618 03:23:10.075 06/25/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3c402a74 into key list 619 03:23:10.075 06/25/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 620 03:23:10.075 06/25/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xab51c01b into key list 621 03:23:39.659 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 622 03:23:39.659 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 623 03:23:39.659 06/25/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 6AE060CF INBOUND SPI = 2608E64A) 624 03:23:39.659 06/25/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=2C424BC6 625 03:23:40.120 06/25/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4ae60826 626 03:23:40.130 06/25/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4ae60826 627 03:23:40.130 06/25/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xcf60e06a 628 03:23:40.130 06/25/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xcf60e06a 629 03:23:46.619 06/25/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x3c402a74 for inbound key with SPI=0xab51c01b 630 03:25:28.281 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 631 03:27:42.971 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854043 632 03:27:42.971 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 633 03:27:43.061 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 634 03:27:43.061 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 635 03:27:43.061 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854044, seq# expected = 3357854044 636 03:30:29.218 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 637 03:35:30.166 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 638 03:40:30.122 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 639 03:45:31.070 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 640 03:50:31.026 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 641 03:53:01.240 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854044 642 03:53:01.240 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 643 03:53:01.330 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 644 03:53:01.330 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 645 03:53:01.330 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854045, seq# expected = 3357854045 646 03:55:12.926 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854045 647 03:55:12.936 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 648 03:55:13.046 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 649 03:55:13.046 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 650 03:55:13.046 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854046, seq# expected = 3357854046 651 03:55:30.944 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 652 04:00:31.783 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 653 04:05:32.211 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 654 04:10:32.168 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 655 04:15:33.097 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 656 04:20:33.535 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 657 04:22:44.726 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854046 658 04:22:44.726 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 659 04:22:49.743 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854047 660 04:22:49.743 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 661 04:22:49.853 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 662 04:22:49.853 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 663 04:22:49.853 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854048, seq# expected = 3357854048 664 04:24:35.387 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854048 665 04:24:35.387 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 666 04:24:35.467 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 667 04:24:35.467 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 668 04:24:35.467 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854049, seq# expected = 3357854049 669 04:25:33.472 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 670 04:30:34.411 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 671 04:31:06.958 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854049 672 04:31:06.958 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 673 04:31:07.048 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 674 04:31:07.048 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 675 04:31:07.048 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854050, seq# expected = 3357854050 676 04:35:34.849 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 677 04:36:35.437 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854050 678 04:36:35.437 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 679 04:36:35.517 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 680 04:36:35.517 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 681 04:36:35.517 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854051, seq# expected = 3357854051 682 04:39:47.717 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854051 683 04:39:47.717 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 684 04:39:47.837 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 685 04:39:47.837 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 686 04:39:47.837 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854052, seq# expected = 3357854052 687 04:40:03.741 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854052 688 04:40:03.741 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 689 04:40:03.831 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 690 04:40:03.831 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 691 04:40:03.831 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854053, seq# expected = 3357854053 692 04:40:34.786 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 693 04:45:35.725 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 694 04:50:36.163 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 695 04:55:36.611 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 696 05:00:37.059 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 697 05:05:37.497 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 698 05:10:06.389 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854053 699 05:10:06.389 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 700 05:10:06.479 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 701 05:10:06.479 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 702 05:10:06.479 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854054, seq# expected = 3357854054 703 05:10:37.935 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 704 05:15:38.403 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 705 05:19:46.264 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854054 706 05:19:46.264 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 707 05:19:46.354 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 708 05:19:46.354 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 709 05:19:46.354 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854055, seq# expected = 3357854055 710 05:19:56.779 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854055 711 05:19:56.779 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 712 05:19:56.879 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 713 05:19:56.879 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 714 05:19:56.879 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854056, seq# expected = 3357854056 715 05:20:38.340 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 716 05:25:39.289 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 717 05:30:39.737 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 718 05:35:40.175 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 719 05:40:41.113 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 720 05:43:13.335 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854056 721 05:43:13.335 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 722 05:43:13.425 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 723 05:43:13.425 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 724 05:43:13.425 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854057, seq# expected = 3357854057 725 05:45:41.051 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 726 05:50:41.499 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 727 05:55:41.937 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 728 06:00:42.375 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 729 06:05:42.823 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 730 06:10:43.261 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 731 06:15:44.155 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 732 06:18:03.349 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854057 733 06:18:03.349 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 734 06:18:03.470 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 735 06:18:03.470 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 736 06:18:03.470 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854058, seq# expected = 3357854058 737 06:20:44.591 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 738 06:25:44.513 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 739 06:26:35.586 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854058 740 06:26:35.586 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 741 06:26:35.666 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 742 06:26:35.666 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 743 06:26:35.666 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854059, seq# expected = 3357854059 744 06:30:45.445 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 745 06:35:45.387 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 746 06:38:50.162 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854059 747 06:38:50.162 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 748 06:38:50.242 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 749 06:38:50.242 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 750 06:38:50.242 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854060, seq# expected = 3357854060 751 06:40:01.264 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854060 752 06:40:01.264 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 753 06:40:01.355 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 754 06:40:01.355 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 755 06:40:01.355 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854061, seq# expected = 3357854061 756 06:40:04.269 06/25/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1070, flags 10h 757 06:40:45.328 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 758 06:45:46.261 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 759 06:50:46.713 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 760 06:55:47.145 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 761 07:05:48.019 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 762 07:10:48.461 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 763 07:15:48.903 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 764 07:20:49.335 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 765 07:25:50.267 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 766 07:25:51.780 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854061 767 07:25:51.780 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 768 07:25:51.860 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 769 07:25:51.860 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 770 07:25:51.860 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854062, seq# expected = 3357854062 771 07:26:02.785 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854062 772 07:26:02.785 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 773 07:26:02.865 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 774 07:26:02.865 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 775 07:26:02.865 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854063, seq# expected = 3357854063 776 07:30:50.199 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 777 07:31:11.239 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854063 778 07:31:11.239 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 779 07:31:11.319 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 780 07:31:11.319 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 781 07:31:11.319 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854064, seq# expected = 3357854064 782 07:35:50.160 06/25/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1070, dst port 4005 783 07:37:14.271 06/25/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3357854064 784 07:37:14.271 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 785 07:37:14.351 06/25/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 786 07:37:14.351 06/25/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 787 07:37:14.351 06/25/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3357854065, seq# expected = 3357854065 788 07:39:07.554 06/25/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 789 07:39:07.554 06/25/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 790 07:39:07.554 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 791 07:39:07.554 06/25/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 742A403C INBOUND SPI = 1BC051AB) 792 07:39:07.564 06/25/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=77D34A89 793 07:39:07.564 06/25/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=99B2D4D0E23E6AB8 R_Cookie=6461C22687B60875) reason = DEL_REASON_RESET_SADB 794 07:39:07.564 06/25/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 795 07:39:07.564 06/25/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=99B2D4D0E23E6AB8 R_Cookie=6461C22687B60875) reason = DEL_REASON_RESET_SADB 796 07:39:07.564 06/25/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 797 07:39:07.564 06/25/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 798 07:39:07.594 06/25/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 799 07:39:07.594 06/25/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1070 for TCP connection. 800 07:39:07.594 06/25/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 17:4:26 801 07:39:07.614 06/25/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 802 07:39:09.687 06/25/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 803 07:39:09.697 06/25/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 804 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xab51c01b 805 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xab51c01b 806 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3c402a74 807 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3c402a74 808 07:39:09.707 06/25/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1070, dst port 4005 809 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 810 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 811 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 812 07:39:09.707 06/25/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys