EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 08:48:58.905 06/30/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 08:48:58.935 06/30/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 08:48:58.935 06/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 08:48:58.965 06/30/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1332 for TCP connection. 5 08:48:59.156 06/30/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 08:48:59.156 06/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 08:48:59.156 06/30/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1332, dst port 4005 8 08:48:59.156 06/30/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1332 9 08:48:59.156 06/30/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1332, dst port 4005 10 08:48:59.156 06/30/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 08:48:59.656 06/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 08:48:59.676 06/30/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 08:48:59.726 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 08:48:59.957 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 08:48:59.957 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 08:48:59.957 06/30/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 08:48:59.957 06/30/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 08:48:59.957 06/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 08:48:59.957 06/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 08:48:59.977 06/30/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 08:48:59.977 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 08:48:59.977 06/30/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 08:48:59.977 06/30/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 08:49:00.067 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 08:49:00.067 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 08:49:00.067 06/30/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 08:49:00.067 06/30/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E9F02FA9F0006B5B R_Cookie=BB4F4DEF479E65C4) reason = DEL_REASON_LOAD_BALANCING 28 08:49:00.067 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 08:49:00.658 06/30/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E9F02FA9F0006B5B R_Cookie=BB4F4DEF479E65C4) reason = DEL_REASON_LOAD_BALANCING 30 08:49:00.658 06/30/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 08:49:00.658 06/30/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 08:49:00.658 06/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 08:49:00.678 06/30/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 08:49:01.168 06/30/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1332, dst port 4005 35 08:49:01.168 06/30/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1332, dst port 4005 36 08:49:01.168 06/30/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1332 37 08:49:01.168 06/30/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1332, dst port 4005 38 08:49:01.168 06/30/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 08:49:01.669 06/30/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 08:49:01.679 06/30/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 08:49:01.709 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 08:49:01.940 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 08:49:01.940 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 08:49:01.940 06/30/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 08:49:01.940 06/30/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 08:49:01.940 06/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 08:49:01.940 06/30/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 08:49:01.940 06/30/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 08:49:01.940 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 08:49:01.940 06/30/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 08:49:01.940 06/30/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 08:49:02.030 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 08:49:02.030 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 08:49:02.030 06/30/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 08:49:14.998 06/30/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 08:49:14.998 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 08:49:19.565 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 08:49:19.565 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 08:49:19.565 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 08:49:19.565 06/30/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 08:49:19.645 06/30/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 08:49:19.645 06/30/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 08:49:19.645 06/30/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 08:49:19.645 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 08:49:20.636 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.98 68 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 08:49:20.636 06/30/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 08:49:20.636 06/30/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 08:49:20.656 06/30/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.98, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 08:49:20.656 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 08:49:20.717 06/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 08:49:20.717 06/30/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 08:49:20.757 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 19 seconds, setting expiry to 86381 seconds from now 89 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 08:49:20.757 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 08:49:20.757 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=F8197994 OUTBOUND SPI = 0x6FC0E619 INBOUND SPI = 0xE9F40D3B) 94 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x6FC0E619 95 08:49:20.757 06/30/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xE9F40D3B 96 08:49:23.761 06/30/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.98/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 08:49:23.791 06/30/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 08:49:23.821 06/30/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 08:49:24.001 06/30/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.143. Current address(es): 192.168.1.143, 10.13.8.98, 192.168.186.1, 192.168.121.1. 100 08:49:24.001 06/30/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.98. Current address(es): 192.168.1.143, 10.13.8.98, 192.168.186.1, 192.168.121.1. 101 08:49:24.192 06/30/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 08:49:24.192 06/30/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x19e6c06f into key list 103 08:49:24.192 06/30/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 08:49:24.192 06/30/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x3b0df4e9 into key list 105 08:49:24.192 06/30/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.98 106 08:49:28.698 06/30/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x19e6c06f for inbound key with SPI=0x3b0df4e9 107 08:51:30.303 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933318 108 08:51:30.303 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 08:51:30.393 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 08:51:30.393 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 08:51:30.393 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933319, seq# expected = 14933319 112 08:52:05.928 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933319 113 08:52:05.928 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 114 08:52:06.018 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 08:52:06.018 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 08:52:06.018 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933320, seq# expected = 14933320 117 08:54:01.836 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 118 08:58:07.271 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933320 119 08:58:07.271 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 120 08:58:07.351 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 121 08:58:07.351 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 122 08:58:07.351 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933321, seq# expected = 14933321 123 08:59:01.860 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 124 09:01:55.610 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933321 125 09:01:55.610 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 126 09:01:55.720 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 127 09:01:55.720 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 128 09:01:55.720 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933322, seq# expected = 14933322 129 09:04:02.793 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 130 09:09:03.254 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 131 09:13:52.906 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933322 132 09:13:52.906 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 133 09:13:52.996 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 134 09:13:52.996 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 135 09:13:52.996 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933323, seq# expected = 14933323 136 09:14:02.932 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 137 09:19:03.900 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 138 09:22:06.189 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933323 139 09:22:06.189 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 140 09:22:06.279 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 141 09:22:06.279 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 142 09:22:06.279 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933324, seq# expected = 14933324 143 09:24:03.868 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 144 09:29:04.627 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 145 09:34:05.038 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 146 09:39:05.490 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 147 09:39:28.020 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933324 148 09:39:28.020 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 149 09:39:28.100 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 150 09:39:28.100 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 151 09:39:28.100 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933325, seq# expected = 14933325 152 09:40:23.596 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933325 153 09:40:23.596 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 154 09:40:23.677 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 155 09:40:23.677 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 156 09:40:23.677 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933326, seq# expected = 14933326 157 09:44:05.901 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 158 09:49:06.312 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 159 09:51:24.501 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933326 160 09:51:24.501 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 161 09:51:24.621 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 162 09:51:24.621 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 163 09:51:24.621 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933327, seq# expected = 14933327 164 09:52:05.056 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933327 165 09:52:05.056 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 166 09:52:05.146 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 09:52:05.146 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 168 09:52:05.146 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933328, seq# expected = 14933328 169 09:54:06.723 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 170 09:59:07.134 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 171 10:04:07.605 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 172 10:09:08.006 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 173 10:10:52.218 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933328 174 10:10:52.218 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 175 10:10:52.308 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 176 10:10:52.308 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 177 10:10:52.308 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933329, seq# expected = 14933329 178 10:14:08.507 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 179 10:19:08.958 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 180 10:22:52.403 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933329 181 10:22:52.403 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 182 10:22:52.494 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 183 10:22:52.494 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 184 10:22:52.494 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933330, seq# expected = 14933330 185 10:23:07.925 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933330 186 10:23:07.925 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 187 10:23:08.015 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 188 10:23:08.015 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 189 10:23:08.015 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933331, seq# expected = 14933331 190 10:24:08.508 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 191 10:26:29.240 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933331 192 10:26:29.240 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 193 10:26:29.320 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 194 10:26:29.320 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 195 10:26:29.320 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933332, seq# expected = 14933332 196 10:29:08.979 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 197 10:30:33.104 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933332 198 10:30:33.104 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 199 10:30:33.194 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 200 10:30:33.194 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 201 10:30:33.194 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933333, seq# expected = 14933333 202 10:30:54.133 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933333 203 10:30:54.133 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 204 10:30:54.213 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 205 10:30:54.213 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 206 10:30:54.213 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933334, seq# expected = 14933334 207 10:31:20.168 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933334 208 10:31:20.168 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 209 10:31:20.248 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 210 10:31:20.248 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 211 10:31:20.248 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933335, seq# expected = 14933335 212 10:31:35.689 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933335 213 10:31:35.689 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 214 10:31:35.770 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 215 10:31:35.770 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 216 10:31:35.770 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933336, seq# expected = 14933336 217 10:33:11.320 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933336 218 10:33:11.320 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 219 10:33:11.410 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 220 10:33:11.410 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 221 10:33:11.410 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933337, seq# expected = 14933337 222 10:34:09.400 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 223 10:34:52.959 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933337 224 10:34:52.959 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 225 10:34:53.049 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 226 10:34:53.049 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 227 10:34:53.049 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933338, seq# expected = 14933338 228 10:37:04.720 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933338 229 10:37:04.720 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 10:37:04.800 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 231 10:37:04.800 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 232 10:37:04.800 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933339, seq# expected = 14933339 233 10:39:10.892 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 234 10:40:11.485 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933339 235 10:40:11.485 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 236 10:40:11.565 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 237 10:40:11.565 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 238 10:40:11.565 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933340, seq# expected = 14933340 239 10:42:48.750 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933340 240 10:42:48.750 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 241 10:42:48.830 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 242 10:42:48.830 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 243 10:42:48.830 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933341, seq# expected = 14933341 244 10:44:10.352 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 245 10:45:50.489 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933341 246 10:45:50.489 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 247 10:45:50.579 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 248 10:45:50.579 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 249 10:45:50.579 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933342, seq# expected = 14933342 250 10:49:11.264 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 251 10:50:56.155 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933342 252 10:50:56.155 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 253 10:50:56.235 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 254 10:50:56.235 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 255 10:50:56.235 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933343, seq# expected = 14933343 256 10:54:11.416 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 257 10:55:53.181 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933343 258 10:55:53.181 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 10:55:53.261 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 10:55:53.261 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 10:55:53.261 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933344, seq# expected = 14933344 262 10:59:11.700 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 263 11:04:11.990 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 264 11:06:15.326 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933344 265 11:06:15.326 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 266 11:06:15.416 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 267 11:06:15.416 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 268 11:06:15.416 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933345, seq# expected = 14933345 269 11:06:55.930 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933345 270 11:06:55.930 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 271 11:06:56.020 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 272 11:06:56.020 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 273 11:06:56.020 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933346, seq# expected = 14933346 274 11:07:06.457 06/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 14933346 275 11:07:06.457 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 276 11:07:06.537 06/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 277 11:07:06.537 06/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 278 11:07:06.537 06/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 14933347, seq# expected = 14933347 279 11:09:12.289 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 280 11:14:12.559 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 281 11:19:12.849 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 282 11:24:13.159 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 283 11:29:13.439 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 284 11:34:13.698 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 285 11:39:14.469 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 286 11:44:14.248 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 287 11:49:14.527 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 288 11:54:14.797 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 289 11:59:14.576 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 290 12:04:15.347 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 291 12:09:16.108 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 292 12:14:15.886 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 293 12:19:16.667 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 294 12:24:16.435 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 295 12:29:16.715 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 296 12:34:16.985 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 297 12:39:17.766 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 298 12:44:17.063 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 299 12:49:17.834 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 300 12:54:18.595 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 301 12:59:18.374 06/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1332, dst port 4005 302 13:02:59.841 06/30/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 303 13:02:59.841 06/30/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 304 13:02:59.841 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 305 13:02:59.841 06/30/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 6FC0E619 INBOUND SPI = E9F40D3B) 306 13:02:59.841 06/30/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=F8197994 307 13:02:59.841 06/30/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=8696741FCD57442D R_Cookie=369FA87D6366C56B) reason = DEL_REASON_RESET_SADB 308 13:02:59.841 06/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 309 13:02:59.841 06/30/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=8696741FCD57442D R_Cookie=369FA87D6366C56B) reason = DEL_REASON_RESET_SADB 310 13:02:59.841 06/30/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 311 13:02:59.841 06/30/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 312 13:02:59.841 06/30/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 313 13:02:59.841 06/30/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1332 for TCP connection. 314 13:02:59.841 06/30/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 4:13:36 315 13:02:59.851 06/30/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 316 13:03:01.425 06/30/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 317 13:03:01.425 06/30/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 318 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x3b0df4e9 319 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x3b0df4e9 320 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x19e6c06f 321 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x19e6c06f 322 13:03:01.425 06/30/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1332, dst port 4005 323 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 324 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 325 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 326 13:03:01.425 06/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys