EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 20:37:50.446 07/10/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 20:37:50.516 07/10/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 20:37:50.526 07/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 20:37:50.546 07/10/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1506 for TCP connection. 5 20:37:51.227 07/10/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 20:37:51.227 07/10/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 20:37:51.227 07/10/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1506, dst port 4005 8 20:37:51.227 07/10/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1506 9 20:37:51.227 07/10/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1506, dst port 4005 10 20:37:51.227 07/10/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 20:37:51.738 07/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 20:37:51.758 07/10/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 20:37:51.788 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 20:37:51.978 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 20:37:51.978 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 20:37:51.978 07/10/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 20:37:51.978 07/10/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 20:37:51.978 07/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 20:37:51.978 07/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 20:37:52.009 07/10/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 20:37:52.009 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 20:37:52.009 07/10/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 20:37:52.009 07/10/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 20:37:52.059 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 20:37:52.059 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 20:37:52.059 07/10/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 20:37:52.059 07/10/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=DF7C64425B6396DC R_Cookie=D499800C2EAC1560) reason = DEL_REASON_LOAD_BALANCING 28 20:37:52.059 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 20:37:52.730 07/10/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=DF7C64425B6396DC R_Cookie=D499800C2EAC1560) reason = DEL_REASON_LOAD_BALANCING 30 20:37:52.730 07/10/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 20:37:52.730 07/10/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 20:37:52.730 07/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 20:37:52.740 07/10/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 20:37:53.240 07/10/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1506, dst port 4005 35 20:37:53.240 07/10/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1506, dst port 4005 36 20:37:53.240 07/10/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1506 37 20:37:53.240 07/10/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1506, dst port 4005 38 20:37:53.240 07/10/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 20:37:53.731 07/10/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 20:37:53.761 07/10/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 20:37:53.791 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 20:37:53.971 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 20:37:53.971 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 20:37:53.971 07/10/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 20:37:53.971 07/10/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 20:37:53.971 07/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 20:37:53.971 07/10/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 20:37:53.981 07/10/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 20:37:53.981 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 20:37:53.981 07/10/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 20:37:53.981 07/10/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 20:37:54.021 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 20:37:54.021 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 20:37:54.021 07/10/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 20:38:11.967 07/10/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 20:38:11.967 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 20:38:20.760 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 20:38:20.760 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 20:38:20.760 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 20:38:20.760 07/10/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 20:38:20.840 07/10/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 20:38:20.840 07/10/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 20:38:20.840 07/10/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 20:38:20.840 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 20:38:21.751 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.197 68 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 20:38:21.751 07/10/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 20:38:21.761 07/10/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 20:38:21.771 07/10/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.197, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 20:38:21.771 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 20:38:21.771 07/10/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 84 20:38:21.771 07/10/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 85 20:38:21.831 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 86 20:38:21.831 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 87 20:38:21.831 07/10/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 88 20:38:21.831 07/10/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 28 seconds, setting expiry to 86372 seconds from now 89 20:38:21.841 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 90 20:38:21.841 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 91 20:38:21.841 07/10/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 92 20:38:21.841 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 93 20:38:21.841 07/10/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=D206E98B OUTBOUND SPI = 0x098D70D0 INBOUND SPI = 0x50A6F334) 94 20:38:21.841 07/10/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x098D70D0 95 20:38:21.841 07/10/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x50A6F334 96 20:38:24.836 07/10/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.197/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 97 20:38:24.996 07/10/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 98 20:38:25.016 07/10/07 Sev=Info/4 CM/0x6310001A One secure connection established 99 20:38:25.066 07/10/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.13.8.197, 192.168.186.1, 192.168.121.1. 100 20:38:25.076 07/10/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.197. Current address(es): 192.168.1.102, 10.13.8.197, 192.168.186.1, 192.168.121.1. 101 20:38:25.346 07/10/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 20:38:25.346 07/10/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xd0708d09 into key list 103 20:38:25.346 07/10/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 20:38:25.346 07/10/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x34f3a650 into key list 105 20:38:25.346 07/10/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.197 106 20:38:29.292 07/10/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xd0708d09 for inbound key with SPI=0x34f3a650 107 20:42:54.433 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 108 20:47:54.699 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 109 20:52:55.631 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 110 20:55:07.320 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225210 111 20:55:07.320 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 112 20:55:07.360 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 113 20:55:07.360 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 114 20:55:07.360 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225211, seq# expected = 1720225211 115 20:57:55.565 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 116 21:00:53.825 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225211 117 21:00:53.825 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 118 21:00:53.875 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 119 21:00:53.875 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 120 21:00:53.875 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225212, seq# expected = 1720225212 121 21:02:56.513 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 122 21:05:35.245 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225212 123 21:05:35.245 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 124 21:05:35.315 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 125 21:05:35.315 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 126 21:05:35.315 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225213, seq# expected = 1720225213 127 21:07:56.000 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 128 21:10:52.247 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225213 129 21:10:52.247 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 130 21:10:52.327 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 131 21:10:52.327 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 132 21:10:52.327 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225214, seq# expected = 1720225214 133 21:12:56.438 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 134 21:16:10.701 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225214 135 21:16:10.701 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 136 21:16:10.771 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 137 21:16:10.771 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 138 21:16:10.771 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225215, seq# expected = 1720225215 139 21:17:56.851 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 140 21:22:57.781 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 141 21:24:53.946 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225215 142 21:24:53.946 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 143 21:24:53.996 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 144 21:24:53.996 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 145 21:24:53.996 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225216, seq# expected = 1720225216 146 21:25:54.533 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225216 147 21:25:54.533 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 148 21:25:54.583 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 149 21:25:54.583 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 150 21:25:54.583 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225217, seq# expected = 1720225217 151 21:26:35.091 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225217 152 21:26:35.091 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 153 21:26:35.141 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 154 21:26:35.141 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 155 21:26:35.141 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225218, seq# expected = 1720225218 156 21:27:57.709 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 157 21:32:58.657 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 158 21:37:59.101 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 159 21:42:59.546 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 160 21:47:59.989 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 161 21:50:35.720 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225218 162 21:50:35.720 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 163 21:50:40.727 07/10/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225219 164 21:50:40.727 07/10/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 165 21:50:40.797 07/10/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 166 21:50:40.797 07/10/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 167 21:50:40.797 07/10/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225220, seq# expected = 1720225220 168 21:52:59.937 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 169 21:58:00.862 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 170 22:03:01.307 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 171 22:08:01.742 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 172 22:13:02.177 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 173 22:18:03.083 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 174 22:23:02.518 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 175 22:28:03.956 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 176 22:33:03.900 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 177 22:38:03.855 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 178 22:43:04.776 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 179 22:48:05.200 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 180 22:53:05.605 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 181 22:58:06.042 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 182 23:03:06.478 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 183 23:08:06.913 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 184 23:13:07.348 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 185 23:18:08.334 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 186 23:23:08.759 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 187 23:28:09.194 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 188 23:33:09.131 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 189 23:38:10.067 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 190 23:43:10.562 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 191 23:48:11.007 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 192 23:53:11.222 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 193 23:58:11.276 07/10/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 194 00:03:11.341 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 195 00:08:11.711 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 196 00:13:12.613 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 197 00:18:12.545 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 198 00:23:13.447 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 199 00:28:13.369 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 200 00:33:13.300 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 201 00:38:14.193 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 202 00:43:14.224 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 203 00:48:14.246 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 204 00:53:14.277 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 205 00:58:14.689 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 206 01:03:15.081 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 207 01:08:15.493 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 208 01:13:15.615 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 209 01:18:16.017 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 210 01:23:16.419 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 211 01:28:16.831 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 212 01:33:17.283 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 213 01:38:18.246 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 214 01:43:18.728 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 215 01:46:09.010 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225220 216 01:46:09.010 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 217 01:46:09.080 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 218 01:46:09.090 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 219 01:46:09.090 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225221, seq# expected = 1720225221 220 01:48:18.946 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 221 01:53:18.638 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 222 01:58:12.030 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225221 223 01:58:12.030 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 224 01:58:12.100 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 225 01:58:12.100 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 226 01:58:12.100 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225222, seq# expected = 1720225222 227 01:58:19.040 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 228 01:58:52.585 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225222 229 01:58:52.585 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 230 01:58:52.625 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 231 01:58:52.625 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 232 01:58:52.625 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225223, seq# expected = 1720225223 233 02:03:19.452 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 234 02:08:19.553 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 235 02:10:11.703 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225223 236 02:10:11.703 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 237 02:10:11.744 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 238 02:10:11.744 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 239 02:10:11.744 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225224, seq# expected = 1720225224 240 02:13:19.955 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 241 02:18:19.857 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 242 02:22:06.170 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225224 243 02:22:06.170 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 244 02:22:06.210 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 245 02:22:06.210 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 246 02:22:06.210 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225225, seq# expected = 1720225225 247 02:23:20.269 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 248 02:33:21.573 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 249 02:34:09.137 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225225 250 02:34:09.137 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 251 02:34:09.177 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 252 02:34:09.177 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 253 02:34:09.177 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225226, seq# expected = 1720225226 254 02:38:21.485 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 255 02:41:50.254 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225226 256 02:41:50.254 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 257 02:41:50.324 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 258 02:41:50.324 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 259 02:41:50.324 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225227, seq# expected = 1720225227 260 02:43:21.877 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 261 02:46:06.096 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225227 262 02:46:06.096 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 263 02:46:06.157 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 264 02:46:06.157 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 265 02:46:06.157 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225228, seq# expected = 1720225228 266 02:48:22.779 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 267 02:53:23.181 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 268 02:56:23.669 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225228 269 02:56:23.669 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 270 02:56:23.739 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 271 02:56:23.739 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 272 02:56:23.739 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225229, seq# expected = 1720225229 273 02:56:34.201 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225229 274 02:56:34.201 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 275 02:56:34.261 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 276 02:56:34.261 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 277 02:56:34.261 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225230, seq# expected = 1720225230 278 02:58:23.031 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 279 03:02:36.502 07/11/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xd0708d09 is about to expire, requesting a new one 280 03:02:36.502 07/11/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.197, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 281 03:02:36.502 07/11/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=7ECD064E) Initiator = ID=10.13.8.197 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 282 03:02:36.502 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 283 03:02:36.592 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 284 03:02:36.592 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 285 03:02:36.592 07/11/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 286 03:02:36.592 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 287 03:02:36.592 07/11/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=7ECD064E OUTBOUND SPI = 0x3FF93370 INBOUND SPI = 0x32EBAD30) 288 03:02:36.592 07/11/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x3FF93370 289 03:02:36.592 07/11/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x32EBAD30 290 03:02:36.592 07/11/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 291 03:02:37.013 07/11/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 292 03:02:37.013 07/11/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7033f93f into key list 293 03:02:37.013 07/11/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 294 03:02:37.013 07/11/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x30adeb32 into key list 295 03:03:06.592 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 296 03:03:06.592 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 297 03:03:06.592 07/11/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 98D70D0 INBOUND SPI = 50A6F334) 298 03:03:06.592 07/11/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=D206E98B 299 03:03:07.063 07/11/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x34f3a650 300 03:03:07.063 07/11/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x34f3a650 301 03:03:07.063 07/11/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xd0708d09 302 03:03:07.063 07/11/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xd0708d09 303 03:03:11.070 07/11/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x7033f93f for inbound key with SPI=0x30adeb32 304 03:03:23.090 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 305 03:08:23.591 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 306 03:10:08.766 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225230 307 03:10:08.766 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 308 03:10:08.806 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 309 03:10:08.806 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 310 03:10:08.806 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225231, seq# expected = 1720225231 311 03:13:23.591 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 312 03:18:23.591 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 313 03:22:13.474 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225231 314 03:22:13.474 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 315 03:22:13.524 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 316 03:22:13.524 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 317 03:22:13.524 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225232, seq# expected = 1720225232 318 03:23:23.591 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 319 03:28:23.591 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 320 03:33:23.592 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 321 03:34:12.673 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225232 322 03:34:12.673 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 323 03:34:12.724 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 324 03:34:12.724 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 325 03:34:12.724 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225233, seq# expected = 1720225233 326 03:38:23.592 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 327 03:43:23.602 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 328 03:46:10.380 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225233 329 03:46:10.380 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 330 03:46:10.430 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 331 03:46:10.430 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 332 03:46:10.430 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225234, seq# expected = 1720225234 333 03:48:23.602 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 334 03:53:23.602 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 335 03:56:56.457 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225234 336 03:56:56.457 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 337 03:56:56.527 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 338 03:56:56.527 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 339 03:56:56.527 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225235, seq# expected = 1720225235 340 03:58:13.596 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225235 341 03:58:13.596 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 342 03:58:19.095 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225236 343 03:58:19.095 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 344 03:58:19.145 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 345 03:58:19.145 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 346 03:58:19.145 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225237, seq# expected = 1720225237 347 03:58:23.602 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 348 04:03:24.370 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 349 04:08:24.071 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 350 04:10:09.723 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225237 351 04:10:09.723 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 352 04:10:09.773 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 353 04:10:09.773 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 354 04:10:09.773 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225238, seq# expected = 1720225238 355 04:13:24.513 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 356 04:18:24.955 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 357 04:22:08.767 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225238 358 04:22:08.767 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 359 04:22:08.857 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 360 04:22:08.857 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 361 04:22:08.857 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225239, seq# expected = 1720225239 362 04:23:24.886 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 363 04:28:25.318 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 364 04:33:26.742 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 365 04:34:09.303 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225239 366 04:34:09.303 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 367 04:34:09.353 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 368 04:34:09.353 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 369 04:34:09.353 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225240, seq# expected = 1720225240 370 04:38:26.673 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 371 04:42:07.991 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225240 372 04:42:07.991 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 373 04:42:08.041 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 374 04:42:08.041 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 375 04:42:08.041 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225241, seq# expected = 1720225241 376 04:43:26.604 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 377 04:46:09.839 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225241 378 04:46:09.839 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 379 04:46:09.879 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 380 04:46:09.879 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 381 04:46:09.879 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225242, seq# expected = 1720225242 382 04:48:27.036 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 383 04:48:55.577 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225242 384 04:48:55.577 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 385 04:48:55.617 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 386 04:48:55.617 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 387 04:48:55.617 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225243, seq# expected = 1720225243 388 04:49:26.121 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225243 389 04:49:26.121 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 390 04:49:26.161 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 391 04:49:26.171 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 392 04:49:26.171 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225244, seq# expected = 1720225244 393 04:53:28.470 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 394 04:58:06.870 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225244 395 04:58:06.870 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 396 04:58:06.910 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 397 04:58:06.910 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 398 04:58:06.910 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225245, seq# expected = 1720225245 399 04:58:27.900 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 400 04:59:54.024 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225245 401 04:59:54.024 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 402 04:59:54.074 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 403 04:59:54.074 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 404 04:59:54.074 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225246, seq# expected = 1720225246 405 05:00:04.539 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225246 406 05:00:04.539 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 407 05:00:04.579 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 408 05:00:04.579 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 409 05:00:04.579 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225247, seq# expected = 1720225247 410 05:03:28.833 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 411 05:08:28.774 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 412 05:10:12.413 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225247 413 05:10:12.413 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 414 05:10:12.453 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 415 05:10:12.453 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 416 05:10:12.453 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225248, seq# expected = 1720225248 417 05:13:29.697 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 418 05:18:30.139 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 419 05:19:27.712 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225248 420 05:19:27.712 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 421 05:19:27.762 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 422 05:19:27.762 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 423 05:19:27.762 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225249, seq# expected = 1720225249 424 05:22:14.451 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225249 425 05:22:14.451 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 426 05:22:14.491 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 427 05:22:14.491 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 428 05:22:14.491 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225250, seq# expected = 1720225250 429 05:23:30.060 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 430 05:28:31.003 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 431 05:33:31.445 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 432 05:38:32.378 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 433 05:43:32.810 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 434 05:48:32.741 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 435 05:53:33.173 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 436 05:58:33.605 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 437 06:03:34.037 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 438 06:08:34.469 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 439 06:10:08.604 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225250 440 06:10:08.604 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 441 06:10:08.654 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 442 06:10:08.654 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 443 06:10:08.654 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225251, seq# expected = 1720225251 444 06:13:34.901 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 445 06:18:35.333 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 446 06:22:12.141 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225251 447 06:22:12.141 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 448 06:22:12.211 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 449 06:22:12.211 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 450 06:22:12.211 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225252, seq# expected = 1720225252 451 06:23:27.748 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225252 452 06:23:27.748 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 453 06:23:27.798 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 454 06:23:27.798 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 455 06:23:27.798 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225253, seq# expected = 1720225253 456 06:23:35.269 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 457 06:24:18.320 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225253 458 06:24:18.320 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 459 06:24:18.370 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 460 06:24:18.370 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 461 06:24:18.370 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225254, seq# expected = 1720225254 462 06:26:19.995 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225254 463 06:26:19.995 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 464 06:26:20.065 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 465 06:26:20.065 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 466 06:26:20.065 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225255, seq# expected = 1720225255 467 06:26:55.546 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225255 468 06:26:55.546 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 469 06:26:55.596 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 470 06:26:55.596 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 471 06:26:55.596 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225256, seq# expected = 1720225256 472 06:27:26.100 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225256 473 06:27:26.100 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 474 06:27:26.140 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 475 06:27:26.140 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 476 06:27:26.140 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225257, seq# expected = 1720225257 477 06:28:35.710 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 478 06:33:36.643 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 479 06:34:08.689 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225257 480 06:34:08.689 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 481 06:34:08.729 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 482 06:34:08.729 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 483 06:34:08.729 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225258, seq# expected = 1720225258 484 06:37:24.471 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225258 485 06:37:24.471 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 486 06:37:24.521 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 487 06:37:24.521 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 488 06:37:24.521 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225259, seq# expected = 1720225259 489 06:37:34.986 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225259 490 06:37:34.986 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 491 06:37:35.036 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 492 06:37:35.036 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 493 06:37:35.036 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225260, seq# expected = 1720225260 494 06:38:36.574 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 495 06:43:37.527 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 496 06:46:05.740 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225260 497 06:46:05.740 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 498 06:46:05.790 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 499 06:46:05.790 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 500 06:46:05.790 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225261, seq# expected = 1720225261 501 06:48:37.959 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 502 06:49:07.501 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225261 503 06:49:07.501 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 504 06:49:07.541 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 505 06:49:07.541 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 506 06:49:07.541 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225262, seq# expected = 1720225262 507 06:49:18.017 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225262 508 06:49:18.017 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 509 06:49:18.057 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 510 06:49:18.057 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 511 06:49:18.057 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225263, seq# expected = 1720225263 512 06:49:33.539 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225263 513 06:49:33.539 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 514 06:49:33.579 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 515 06:49:33.579 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 516 06:49:33.579 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225264, seq# expected = 1720225264 517 06:53:37.940 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 518 06:58:38.863 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 519 07:01:50.669 07/11/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1720225264 520 07:01:50.669 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 521 07:01:50.719 07/11/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 522 07:01:50.719 07/11/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 523 07:01:50.719 07/11/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1720225265, seq# expected = 1720225265 524 07:03:38.384 07/11/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1506, dst port 4005 525 07:05:37.235 07/11/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 526 07:05:37.235 07/11/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 527 07:05:37.235 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 528 07:05:37.235 07/11/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 3FF93370 INBOUND SPI = 32EBAD30) 529 07:05:37.235 07/11/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=7ECD064E 530 07:05:37.235 07/11/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E0891E9ED2E70386 R_Cookie=DB5730EEB0A25798) reason = DEL_REASON_RESET_SADB 531 07:05:37.235 07/11/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 532 07:05:37.235 07/11/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E0891E9ED2E70386 R_Cookie=DB5730EEB0A25798) reason = DEL_REASON_RESET_SADB 533 07:05:37.235 07/11/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 534 07:05:37.235 07/11/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 535 07:05:37.235 07/11/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 536 07:05:37.235 07/11/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1506 for TCP connection. 537 07:05:37.235 07/11/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 10:27:12 538 07:05:37.285 07/11/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 539 07:05:38.827 07/11/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 540 07:05:38.867 07/11/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 541 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x30adeb32 542 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x30adeb32 543 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7033f93f 544 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7033f93f 545 07:05:38.867 07/11/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1506, dst port 4005 546 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 547 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 548 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 549 07:05:38.867 07/11/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys