EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 21:31:41.785 06/27/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 21:31:41.825 06/27/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 21:31:41.825 06/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 21:31:41.865 06/27/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1097 for TCP connection. 5 21:31:41.905 06/27/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 21:31:41.905 06/27/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 21:31:41.905 06/27/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1097, dst port 4005 8 21:31:42.406 06/27/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1097 9 21:31:42.406 06/27/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1097, dst port 4005 10 21:31:42.406 06/27/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 21:31:42.906 06/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 21:31:42.926 06/27/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 21:31:42.967 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 21:31:43.197 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 21:31:43.197 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 21:31:43.197 06/27/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 21:31:43.197 06/27/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 21:31:43.197 06/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 21:31:43.197 06/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 21:31:43.217 06/27/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 21:31:43.217 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 21:31:43.217 06/27/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 21:31:43.217 06/27/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 21:31:43.297 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 21:31:43.297 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 21:31:43.297 06/27/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.17" from primary server 27 21:31:43.297 06/27/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3F20A9874EC62D89 R_Cookie=AE33A71496F1CC3D) reason = DEL_REASON_LOAD_BALANCING 28 21:31:43.297 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 21:31:43.908 06/27/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=3F20A9874EC62D89 R_Cookie=AE33A71496F1CC3D) reason = DEL_REASON_LOAD_BALANCING 30 21:31:43.908 06/27/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 21:31:43.908 06/27/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.17" given by the primary server 32 21:31:43.908 06/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 33 21:31:43.918 06/27/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 21:31:44.409 06/27/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1097, dst port 4005 35 21:31:44.409 06/27/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.17, src port 1097, dst port 4005 36 21:31:44.409 06/27/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.17, src port 4005, dst port 1097 37 21:31:44.409 06/27/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.17, src port 1097, dst port 4005 38 21:31:44.409 06/27/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.17" 39 21:31:44.909 06/27/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.17" 40 21:31:44.919 06/27/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.17. 41 21:31:44.939 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.17 42 21:31:45.170 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 43 21:31:45.170 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.17 44 21:31:45.170 06/27/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 21:31:45.170 06/27/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 21:31:45.170 06/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 21:31:45.180 06/27/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 21:31:45.200 06/27/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 21:31:45.200 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.17 50 21:31:45.200 06/27/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 21:31:45.200 06/27/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 21:31:45.280 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 53 21:31:45.280 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 54 21:31:45.280 06/27/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 21:32:01.623 06/27/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 21:32:01.623 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 57 21:32:03.977 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 58 21:32:03.977 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 59 21:32:03.977 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 60 21:32:03.977 06/27/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 21:32:04.087 06/27/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 21:32:04.087 06/27/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 21:32:04.087 06/27/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 21:32:04.087 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.17 65 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 66 21:32:04.998 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.17 67 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.32.199 68 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 21:32:04.998 06/27/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 21:32:05.058 06/27/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 21:32:05.068 06/27/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.199, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 82 21:32:05.068 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 83 21:32:05.078 06/27/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 21:32:05.078 06/27/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 21:32:05.188 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 86 21:32:05.188 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 87 21:32:05.188 06/27/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 21:32:05.188 06/27/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 21 seconds, setting expiry to 86379 seconds from now 89 21:32:05.198 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 90 21:32:05.198 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 91 21:32:05.198 06/27/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 21:32:05.198 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 93 21:32:05.198 06/27/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=47CDFED0 OUTBOUND SPI = 0x1F989F9A INBOUND SPI = 0x388D2D77) 94 21:32:05.198 06/27/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x1F989F9A 95 21:32:05.198 06/27/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x388D2D77 96 21:32:07.702 06/27/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.32.199/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 21:32:07.742 06/27/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 21:32:07.762 06/27/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 21:32:07.782 06/27/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.143. Current address(es): 192.168.1.143, 10.13.32.199, 192.168.186.1, 192.168.121.1. 100 21:32:07.782 06/27/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.32.199. Current address(es): 192.168.1.143, 10.13.32.199, 192.168.186.1, 192.168.121.1. 101 21:32:08.223 06/27/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 21:32:08.223 06/27/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x9a9f981f into key list 103 21:32:08.223 06/27/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 21:32:08.223 06/27/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x772d8d38 into key list 105 21:32:08.223 06/27/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.32.199 106 21:32:15.453 06/27/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x9a9f981f for inbound key with SPI=0x772d8d38 107 21:33:47.491 06/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229864 108 21:33:47.491 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 109 21:33:47.571 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 110 21:33:47.571 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 111 21:33:47.571 06/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229865, seq# expected = 3366229865 112 21:34:45.984 06/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229865 113 21:34:45.984 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 114 21:34:46.064 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 115 21:34:46.064 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 116 21:34:46.064 06/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229866, seq# expected = 3366229866 117 21:36:44.971 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 118 21:41:45.810 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 119 21:46:46.242 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 120 21:51:46.179 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 121 21:56:46.625 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 122 22:01:47.069 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 123 22:06:48.013 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 124 22:11:48.396 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 125 22:16:48.821 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 126 22:19:46.573 06/27/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229866 127 22:19:46.573 06/27/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 128 22:19:46.673 06/27/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 129 22:19:46.673 06/27/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 130 22:19:46.673 06/27/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229867, seq# expected = 3366229867 131 22:21:49.247 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 132 22:26:49.196 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 133 22:31:49.704 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 134 22:36:50.150 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 135 22:41:50.603 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 136 22:46:51.066 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 137 22:51:51.529 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 138 22:56:52.001 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 139 23:01:51.932 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 140 23:06:52.364 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 141 23:11:53.297 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 142 23:16:53.725 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 143 23:21:54.152 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 144 23:26:54.584 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 145 23:31:55.016 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 146 23:36:55.445 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 147 23:41:55.376 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 148 23:46:56.309 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 149 23:51:56.729 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 150 23:56:57.150 06/27/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 151 00:01:57.579 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 152 00:06:58.011 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 153 00:11:58.465 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 154 00:16:58.910 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 155 00:21:59.345 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 156 00:26:59.780 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 157 00:32:00.215 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 158 00:37:00.650 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 159 00:42:01.095 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 160 00:47:01.530 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 161 00:50:02.792 06/28/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.17, src port 4005, dst port 1097, flags 10h 162 00:52:01.965 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 163 00:57:02.400 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 164 01:02:02.798 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 165 01:07:02.719 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 166 01:12:03.642 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 167 01:17:04.065 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 168 01:22:04.488 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 169 01:24:45.715 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229867 170 01:24:45.715 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 171 01:24:45.796 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 172 01:24:45.796 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 173 01:24:45.796 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229868, seq# expected = 3366229868 174 01:27:04.911 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 175 01:32:05.342 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 176 01:34:47.102 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229868 177 01:34:47.102 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 178 01:34:47.192 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 179 01:34:47.192 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 180 01:34:47.192 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229869, seq# expected = 3366229869 181 01:37:05.818 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 182 01:42:06.157 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 183 01:47:06.586 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 184 01:52:07.015 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 185 01:57:07.444 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 186 02:02:07.873 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 187 02:04:45.598 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229869 188 02:04:45.598 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 189 02:04:45.678 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 190 02:04:45.678 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 191 02:04:45.678 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229870, seq# expected = 3366229870 192 02:07:08.301 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 193 02:12:08.728 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 194 02:16:52.133 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229870 195 02:16:52.133 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 196 02:16:52.213 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 197 02:16:52.213 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 198 02:16:52.213 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229871, seq# expected = 3366229871 199 02:17:08.656 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 200 02:22:09.085 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 201 02:24:48.313 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229871 202 02:24:48.313 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 203 02:24:48.403 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 204 02:24:48.403 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 205 02:24:48.403 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229872, seq# expected = 3366229872 206 02:27:09.514 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 207 02:32:09.943 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 208 02:34:49.671 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229872 209 02:34:49.671 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 210 02:34:49.751 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 211 02:34:49.751 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 212 02:34:49.751 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229873, seq# expected = 3366229873 213 02:36:45.336 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229873 214 02:36:45.336 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 215 02:36:45.417 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 216 02:36:45.417 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 217 02:36:45.417 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229874, seq# expected = 3366229874 218 02:37:10.372 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 219 02:42:11.315 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 220 02:47:11.759 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 221 02:50:19.029 06/28/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.17, src port 4005, dst port 1097, flags 10h 222 02:52:12.191 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 223 02:52:52.249 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229874 224 02:52:52.249 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 225 02:52:52.329 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 226 02:52:52.329 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 227 02:52:52.329 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229875, seq# expected = 3366229875 228 02:57:12.623 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 229 03:02:13.055 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 230 03:04:48.779 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229875 231 03:04:48.779 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 232 03:04:48.859 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 233 03:04:48.859 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 234 03:04:48.859 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229876, seq# expected = 3366229876 235 03:07:13.487 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 236 03:12:13.919 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 237 03:17:14.351 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 238 03:19:45.569 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229876 239 03:19:45.569 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 240 03:19:45.649 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 241 03:19:45.649 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 242 03:19:45.649 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229877, seq# expected = 3366229877 243 03:22:14.783 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 244 03:27:15.215 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 245 03:28:51.854 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229877 246 03:28:51.854 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 247 03:28:51.934 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 248 03:28:51.934 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 249 03:28:51.934 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229878, seq# expected = 3366229878 250 03:32:15.647 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 251 03:34:47.866 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229878 252 03:34:47.866 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 253 03:34:47.946 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 254 03:34:47.946 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 255 03:34:47.946 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229879, seq# expected = 3366229879 256 03:37:16.079 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 257 03:40:48.885 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229879 258 03:40:48.885 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 259 03:40:48.965 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 260 03:40:48.965 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 261 03:40:48.965 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229880, seq# expected = 3366229880 262 03:42:16.011 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 263 03:47:16.943 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 264 03:49:45.155 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229880 265 03:49:45.155 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 266 03:49:45.236 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 267 03:49:45.236 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 268 03:49:45.236 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229881, seq# expected = 3366229881 269 03:52:16.872 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 270 03:52:45.914 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229881 271 03:52:45.914 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 272 03:52:45.994 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 273 03:52:45.994 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 274 03:52:45.994 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229882, seq# expected = 3366229882 275 03:56:07.704 06/28/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x9a9f981f is about to expire, requesting a new one 276 03:56:07.704 06/28/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.32.199, GW IP = 137.69.115.17, Remote IP = 0.0.0.0 277 03:56:07.704 06/28/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=C673DB81) Initiator = ID=10.13.32.199 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 278 03:56:07.704 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.17 279 03:56:07.794 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 280 03:56:07.794 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.17 281 03:56:07.794 06/28/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 282 03:56:07.794 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.17 283 03:56:07.794 06/28/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=C673DB81 OUTBOUND SPI = 0x028267EA INBOUND SPI = 0xB8B6BDB5) 284 03:56:07.794 06/28/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x028267EA 285 03:56:07.794 06/28/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xB8B6BDB5 286 03:56:07.794 06/28/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 287 03:56:08.204 06/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 288 03:56:08.204 06/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xea678202 into key list 289 03:56:08.204 06/28/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 290 03:56:08.204 06/28/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb5bdb6b8 into key list 291 03:56:37.787 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 292 03:56:37.787 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.17 293 03:56:37.787 06/28/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 1F989F9A INBOUND SPI = 388D2D77) 294 03:56:37.787 06/28/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=47CDFED0 295 03:56:38.247 06/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x772d8d38 296 03:56:38.247 06/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x772d8d38 297 03:56:38.247 06/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x9a9f981f 298 03:56:38.247 06/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x9a9f981f 299 03:56:45.758 06/28/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xea678202 for inbound key with SPI=0xb5bdb6b8 300 03:57:17.304 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 301 04:02:17.736 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 302 04:04:47.451 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229882 303 04:04:47.451 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 304 04:04:47.531 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 305 04:04:47.531 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 306 04:04:47.531 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229883, seq# expected = 3366229883 307 04:07:18.668 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 308 04:12:19.100 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 309 04:17:09.017 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229883 310 04:17:09.017 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 311 04:17:09.097 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 312 04:17:09.097 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 313 04:17:09.097 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229884, seq# expected = 3366229884 314 04:17:19.032 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 315 04:22:19.964 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 316 04:27:20.396 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 317 04:28:45.519 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229884 318 04:28:45.519 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 319 04:28:45.599 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 320 04:28:45.599 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 321 04:28:45.599 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229885, seq# expected = 3366229885 322 04:31:51.286 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229885 323 04:31:51.286 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 324 04:31:51.366 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 325 04:31:51.366 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 326 04:31:51.366 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229886, seq# expected = 3366229886 327 04:32:01.801 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229886 328 04:32:01.801 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 329 04:32:01.881 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 330 04:32:01.881 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 331 04:32:01.881 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229887, seq# expected = 3366229887 332 04:32:17.323 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229887 333 04:32:17.323 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 334 04:32:17.403 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 335 04:32:17.403 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 336 04:32:17.403 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229888, seq# expected = 3366229888 337 04:32:20.328 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 338 04:32:52.874 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229888 339 04:32:52.874 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 340 04:32:52.955 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 341 04:32:52.955 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 342 04:32:52.955 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229889, seq# expected = 3366229889 343 04:37:21.260 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 344 04:40:44.052 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229889 345 04:40:44.052 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 346 04:40:44.152 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 347 04:40:44.152 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 348 04:40:44.152 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229890, seq# expected = 3366229890 349 04:42:21.192 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 350 04:47:22.124 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 351 04:52:22.556 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 352 04:52:45.589 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229890 353 04:52:45.589 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 354 04:52:45.670 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 355 04:52:45.670 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 356 04:52:45.670 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229891, seq# expected = 3366229891 357 04:57:22.986 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 358 05:02:23.411 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 359 05:04:47.118 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229891 360 05:04:47.118 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 361 05:04:47.198 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 362 05:04:47.198 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 363 05:04:47.198 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229892, seq# expected = 3366229892 364 05:07:23.343 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 365 05:12:23.775 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 366 05:16:43.648 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229892 367 05:16:43.648 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 368 05:16:43.728 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 369 05:16:43.728 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 370 05:16:43.728 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229893, seq# expected = 3366229893 371 05:17:24.207 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 372 05:19:49.415 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229893 373 05:19:49.415 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 374 05:19:49.496 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 375 05:19:49.496 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 376 05:19:49.496 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229894, seq# expected = 3366229894 377 05:22:25.139 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 378 05:27:25.571 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 379 05:28:45.687 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229894 380 05:28:45.687 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 381 05:28:45.767 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 382 05:28:45.767 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 383 05:28:45.767 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229895, seq# expected = 3366229895 384 05:32:26.003 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 385 05:34:46.706 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229895 386 05:34:46.706 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 387 05:34:46.786 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 388 05:34:46.786 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 389 05:34:46.786 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229896, seq# expected = 3366229896 390 05:37:26.435 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 391 05:40:47.725 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229896 392 05:40:47.725 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 393 05:40:47.805 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 394 05:40:47.805 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 395 05:40:47.805 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229897, seq# expected = 3366229897 396 05:42:26.367 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 397 05:47:27.299 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 398 05:49:49.003 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229897 399 05:49:49.003 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 400 05:49:49.083 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 401 05:49:49.083 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 402 05:49:49.083 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229898, seq# expected = 3366229898 403 05:52:27.731 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 404 05:57:28.163 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 405 06:02:28.595 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 406 06:07:29.010 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 407 06:12:29.428 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 408 06:17:21.845 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229898 409 06:17:21.845 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 410 06:17:21.925 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 411 06:17:21.925 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 412 06:17:21.925 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229899, seq# expected = 3366229899 413 06:17:29.356 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 414 06:17:42.375 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229899 415 06:17:42.375 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 416 06:17:42.455 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 417 06:17:42.455 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 418 06:17:42.455 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229900, seq# expected = 3366229900 419 06:17:57.897 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229900 420 06:17:57.897 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 421 06:17:57.977 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 422 06:17:57.977 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 423 06:17:57.977 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229901, seq# expected = 3366229901 424 06:18:18.426 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229901 425 06:18:18.426 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 426 06:18:18.526 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 427 06:18:18.526 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 428 06:18:18.526 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229902, seq# expected = 3366229902 429 06:19:49.055 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229902 430 06:19:49.055 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 431 06:19:49.136 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 432 06:19:49.136 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 433 06:19:49.136 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229903, seq# expected = 3366229903 434 06:22:30.286 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 435 06:27:30.715 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 436 06:28:45.321 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229903 437 06:28:45.321 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 438 06:28:45.401 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 439 06:28:45.401 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 440 06:28:45.401 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229904, seq# expected = 3366229904 441 06:32:31.144 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 442 06:34:51.344 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229904 443 06:34:51.344 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 444 06:34:51.434 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 445 06:34:51.434 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 446 06:34:51.434 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229905, seq# expected = 3366229905 447 06:35:02.360 06/28/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.17, src port 4005, dst port 1097, flags 10h 448 06:37:31.573 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 449 06:40:42.345 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229905 450 06:40:42.345 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 451 06:40:42.425 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 452 06:40:42.425 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 453 06:40:42.425 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229906, seq# expected = 3366229906 454 06:42:31.501 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 455 06:47:32.431 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 456 06:52:32.860 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 457 06:52:43.875 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229906 458 06:52:43.875 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 459 06:52:43.976 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 460 06:52:43.976 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 461 06:52:43.976 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229907, seq# expected = 3366229907 462 06:57:33.289 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 463 07:02:33.718 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 464 07:07:34.147 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 465 07:12:34.576 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 466 07:17:35.044 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 467 07:19:46.736 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229907 468 07:19:46.736 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 469 07:19:46.826 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 470 07:19:46.826 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 471 07:19:46.826 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229908, seq# expected = 3366229908 472 07:22:35.478 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 473 07:27:35.910 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 474 07:32:36.352 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 475 07:33:28.928 06/28/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.17, seq# = 3366229908 476 07:33:28.928 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.17 477 07:33:29.008 06/28/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.17 478 07:33:29.008 06/28/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.17 479 07:33:29.008 06/28/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.17, seq# received = 3366229909, seq# expected = 3366229909 480 07:37:36.784 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 481 07:42:37.216 06/28/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.17, src port 1097, dst port 4005 482 07:46:33.867 06/28/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 483 07:46:33.867 06/28/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 484 07:46:33.877 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.17 485 07:46:33.877 06/28/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 28267EA INBOUND SPI = B8B6BDB5) 486 07:46:33.877 06/28/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=C673DB81 487 07:46:33.877 06/28/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=765B7E59AE087476 R_Cookie=F6BBA1D581B08FE0) reason = DEL_REASON_RESET_SADB 488 07:46:33.877 06/28/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.17 489 07:46:33.877 06/28/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=765B7E59AE087476 R_Cookie=F6BBA1D581B08FE0) reason = DEL_REASON_RESET_SADB 490 07:46:33.877 06/28/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 491 07:46:33.877 06/28/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 492 07:46:33.877 06/28/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 493 07:46:33.877 06/28/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1097 for TCP connection. 494 07:46:33.877 06/28/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.17 disconnected: duration: 0 days 10:14:26 495 07:46:33.887 06/28/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 496 07:46:35.559 06/28/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 497 07:46:35.559 06/28/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 498 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb5bdb6b8 499 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb5bdb6b8 500 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xea678202 501 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xea678202 502 07:46:35.569 06/28/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.17, src port 1097, dst port 4005 503 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 504 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 505 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 506 07:46:35.569 06/28/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys