EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 15:31:15.698 07/13/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 15:31:15.748 07/13/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 15:31:15.748 07/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 15:31:15.828 07/13/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1077 for TCP connection. 5 15:31:15.828 07/13/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 15:31:15.828 07/13/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 15:31:15.828 07/13/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1077, dst port 4005 8 15:31:16.809 07/13/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1077 9 15:31:16.809 07/13/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1077, dst port 4005 10 15:31:16.809 07/13/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 15:31:17.310 07/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 15:31:17.330 07/13/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 15:31:17.380 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 15:31:17.560 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 15:31:17.560 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 15:31:17.560 07/13/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 15:31:17.560 07/13/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 15:31:17.560 07/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 15:31:17.560 07/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 15:31:17.580 07/13/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 15:31:17.580 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 15:31:17.580 07/13/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 15:31:17.580 07/13/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 15:31:17.630 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 15:31:17.630 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 15:31:17.630 07/13/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 15:31:17.630 07/13/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=CCB59AAC513C40C6 R_Cookie=A795B48E7A010D8B) reason = DEL_REASON_LOAD_BALANCING 28 15:31:17.630 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 15:31:18.311 07/13/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=CCB59AAC513C40C6 R_Cookie=A795B48E7A010D8B) reason = DEL_REASON_LOAD_BALANCING 30 15:31:18.311 07/13/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 15:31:18.311 07/13/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 15:31:18.311 07/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 15:31:18.321 07/13/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 15:31:18.812 07/13/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1077, dst port 4005 35 15:31:18.812 07/13/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1077, dst port 4005 36 15:31:18.812 07/13/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1077 37 15:31:18.812 07/13/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1077, dst port 4005 38 15:31:18.812 07/13/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 15:31:19.313 07/13/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 15:31:19.333 07/13/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 15:31:19.353 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 15:31:19.543 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 15:31:19.543 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 15:31:19.543 07/13/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 15:31:19.543 07/13/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 15:31:19.543 07/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 15:31:19.543 07/13/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 15:31:19.563 07/13/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 15:31:19.563 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 15:31:19.563 07/13/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 15:31:19.563 07/13/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 15:31:19.603 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 15:31:19.603 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 15:31:19.603 07/13/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 15:31:32.922 07/13/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 15:31:32.922 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 15:31:35.696 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 15:31:35.696 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 15:31:35.696 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 15:31:35.696 07/13/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 15:31:35.947 07/13/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 15:31:35.947 07/13/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 15:31:35.947 07/13/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 15:31:35.947 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 15:31:36.888 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.91 68 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 15:31:36.888 07/13/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 15:31:36.888 07/13/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 15:31:36.888 07/13/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.91, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 15:31:36.888 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 15:31:36.948 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 15:31:36.948 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 15:31:36.948 07/13/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 15:31:36.948 07/13/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 17 seconds, setting expiry to 86383 seconds from now 87 15:31:36.948 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 15:31:36.948 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 15:31:36.948 07/13/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 15:31:36.948 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 15:31:36.948 07/13/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=978E31D7 OUTBOUND SPI = 0x59B63DA9 INBOUND SPI = 0x09C3D7B1) 92 15:31:36.948 07/13/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x59B63DA9 93 15:31:36.958 07/13/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x09C3D7B1 94 15:31:45.260 07/13/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.91/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 15:31:45.380 07/13/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 15:31:45.410 07/13/07 Sev=Info/4 CM/0x6310001A One secure connection established 97 15:31:45.541 07/13/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.13.8.91, 192.168.186.1, 192.168.121.1. 98 15:31:45.541 07/13/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.91. Current address(es): 192.168.1.102, 10.13.8.91, 192.168.186.1, 192.168.121.1. 99 15:31:45.781 07/13/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 15:31:45.791 07/13/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 15:31:45.791 07/13/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 15:31:45.791 07/13/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xa93db659 into key list 103 15:31:45.791 07/13/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 15:31:45.791 07/13/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb1d7c309 into key list 105 15:31:45.791 07/13/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.91 106 15:31:47.854 07/13/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xa93db659 for inbound key with SPI=0xb1d7c309 107 15:35:08.152 07/13/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1077, flags 10h 108 15:35:08.653 07/13/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1077, flags 10h 109 15:36:19.775 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 110 15:41:21.218 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 111 15:46:20.669 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 112 15:51:21.665 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 113 15:56:21.976 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 114 16:01:21.937 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 115 16:06:22.406 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 116 16:11:22.886 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 117 16:16:23.357 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 118 16:21:24.339 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 119 16:26:24.339 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 120 16:31:24.810 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 121 16:36:25.291 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 122 16:41:25.547 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 123 16:46:25.814 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 124 16:51:26.191 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 125 16:56:26.125 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 126 17:01:27.201 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 127 17:06:27.090 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 128 17:11:27.500 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 129 17:16:28.055 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 130 17:21:28.002 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 131 17:26:28.419 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 132 17:31:29.366 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 133 17:36:29.328 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 134 17:41:29.754 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 135 17:46:30.181 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 136 17:51:30.631 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 137 17:56:31.067 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 138 18:01:31.864 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 139 18:06:31.825 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 140 18:11:32.302 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 141 18:16:32.740 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 142 18:21:32.706 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 143 18:26:34.131 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 144 18:36:34.526 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 145 18:41:34.966 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 146 18:46:35.396 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 147 18:51:35.851 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 148 18:56:36.296 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 149 19:01:37.242 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 150 19:06:37.176 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 151 19:11:37.621 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 152 19:16:38.071 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 153 19:21:38.512 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 154 19:26:38.452 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 155 19:31:39.404 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 156 19:36:39.855 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 157 19:41:40.296 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 158 19:46:40.300 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 159 19:51:40.723 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 160 19:56:40.738 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 161 20:01:41.223 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 162 20:06:41.728 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 163 20:11:42.213 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 164 20:16:05.644 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990182 165 20:16:05.644 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 166 20:16:05.724 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 167 20:16:05.724 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 168 20:16:05.724 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990183, seq# expected = 3288990183 169 20:16:42.147 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 170 20:17:31.719 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990183 171 20:17:31.719 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 172 20:17:31.759 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 173 20:17:31.759 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 174 20:17:31.759 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990184, seq# expected = 3288990184 175 20:21:43.083 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 176 20:23:51.757 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990184 177 20:23:51.757 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 178 20:23:51.817 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 179 20:23:51.817 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 180 20:23:51.817 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990185, seq# expected = 3288990185 181 20:26:43.496 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 182 20:28:05.113 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990185 183 20:28:05.113 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 184 20:28:05.163 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 185 20:28:05.163 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 186 20:28:05.163 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990186, seq# expected = 3288990186 187 20:31:43.935 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 188 20:34:18.165 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990186 189 20:34:18.165 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 190 20:34:18.205 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 191 20:34:18.205 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 192 20:34:18.205 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990187, seq# expected = 3288990187 193 20:36:44.364 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 194 20:41:44.793 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 195 20:46:45.292 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 196 20:49:20.013 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990187 197 20:49:20.023 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 198 20:49:20.063 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 199 20:49:20.063 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 200 20:49:20.063 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990188, seq# expected = 3288990188 201 20:51:45.721 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 202 20:56:46.701 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 203 21:01:46.158 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 204 21:04:16.866 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990188 205 21:04:16.866 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 206 21:04:16.906 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 207 21:04:16.906 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 208 21:04:16.906 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990189, seq# expected = 3288990189 209 21:06:47.083 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 210 21:11:47.518 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 211 21:16:47.913 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 212 21:17:44.495 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990189 213 21:17:44.495 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 214 21:17:44.555 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 215 21:17:44.555 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 216 21:17:44.555 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990190, seq# expected = 3288990190 217 21:19:15.127 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990190 218 21:19:15.127 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 219 21:19:15.167 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 220 21:19:15.167 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 221 21:19:15.167 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990191, seq# expected = 3288990191 222 21:21:48.849 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 223 21:26:48.783 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 224 21:27:51.875 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990191 225 21:27:51.875 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 226 21:27:51.915 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 227 21:27:51.915 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 228 21:27:51.915 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990192, seq# expected = 3288990192 229 21:31:49.218 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 230 21:36:49.163 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 231 21:39:50.916 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990192 232 21:39:50.916 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 233 21:39:50.966 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 234 21:39:50.966 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 235 21:39:50.966 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990193, seq# expected = 3288990193 236 21:40:06.438 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990193 237 21:40:06.438 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 238 21:40:06.488 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 239 21:40:06.488 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 240 21:40:06.488 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990194, seq# expected = 3288990194 241 21:40:26.968 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990194 242 21:40:26.968 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 243 21:40:27.018 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 244 21:40:27.018 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 245 21:40:27.018 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990195, seq# expected = 3288990195 246 21:40:47.498 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990195 247 21:40:47.498 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 248 21:40:47.548 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 249 21:40:47.548 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 250 21:40:47.548 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990196, seq# expected = 3288990196 251 21:41:18.042 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990196 252 21:41:18.042 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 253 21:41:18.082 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 254 21:41:18.082 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 255 21:41:18.082 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990197, seq# expected = 3288990197 256 21:41:49.598 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 257 21:42:08.615 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990197 258 21:42:08.615 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 21:42:08.655 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 21:42:08.655 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 21:42:08.655 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990198, seq# expected = 3288990198 262 21:46:50.043 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 263 21:49:17.246 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990198 264 21:49:17.246 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 265 21:49:17.296 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 266 21:49:17.296 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 267 21:49:17.296 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990199, seq# expected = 3288990199 268 21:51:50.968 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 269 21:55:52.338 07/13/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xa93db659 is about to expire, requesting a new one 270 21:55:52.338 07/13/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.91, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 271 21:55:52.338 07/13/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=A856E1D4) Initiator = ID=10.13.8.91 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 272 21:55:52.348 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 273 21:55:52.428 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 274 21:55:52.428 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 275 21:55:52.428 07/13/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 276 21:55:52.428 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 277 21:55:52.428 07/13/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=A856E1D4 OUTBOUND SPI = 0x31A5AE4C INBOUND SPI = 0x1F47EA05) 278 21:55:52.438 07/13/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x31A5AE4C 279 21:55:52.438 07/13/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x1F47EA05 280 21:55:52.438 07/13/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 281 21:55:52.869 07/13/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 282 21:55:52.869 07/13/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x4caea531 into key list 283 21:55:52.869 07/13/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 284 21:55:52.869 07/13/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x05ea471f into key list 285 21:56:22.411 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 286 21:56:22.411 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 287 21:56:22.411 07/13/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 59B63DA9 INBOUND SPI = 9C3D7B1) 288 21:56:22.411 07/13/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=978E31D7 289 21:56:22.882 07/13/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb1d7c309 290 21:56:22.882 07/13/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb1d7c309 291 21:56:22.882 07/13/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xa93db659 292 21:56:22.882 07/13/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xa93db659 293 21:56:50.923 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 294 21:56:52.425 07/13/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x4caea531 for inbound key with SPI=0x05ea471f 295 22:01:51.868 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 296 22:04:19.070 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990199 297 22:04:19.070 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 298 22:04:19.141 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 299 22:04:19.141 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 300 22:04:19.141 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990200, seq# expected = 3288990200 301 22:06:52.779 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 302 22:11:53.204 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 303 22:15:24.505 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990200 304 22:15:24.505 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 305 22:15:24.545 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 306 22:15:24.545 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 307 22:15:24.545 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990201, seq# expected = 3288990201 308 22:16:53.132 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 309 22:19:18.349 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990201 310 22:19:18.349 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 311 22:19:18.399 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 312 22:19:18.399 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 313 22:19:18.399 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990202, seq# expected = 3288990202 314 22:21:54.072 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 315 22:26:54.000 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 316 22:27:51.582 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990202 317 22:27:51.582 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 318 22:27:51.622 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 319 22:27:51.622 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 320 22:27:51.622 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990203, seq# expected = 3288990203 321 22:29:38.735 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990203 322 22:29:38.735 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 323 22:29:38.775 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 324 22:29:38.775 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 325 22:29:38.775 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990204, seq# expected = 3288990204 326 22:31:54.930 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 327 22:34:17.133 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990204 328 22:34:17.133 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 329 22:34:17.173 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 330 22:34:17.173 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 331 22:34:17.173 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990205, seq# expected = 3288990205 332 22:36:54.858 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 333 22:41:55.788 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 334 22:46:55.716 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 335 22:49:18.920 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990205 336 22:49:18.920 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 337 22:49:18.991 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 338 22:49:18.991 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 339 22:49:18.991 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990206, seq# expected = 3288990206 340 22:51:55.644 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 341 22:56:56.574 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 342 23:01:57.504 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 343 23:03:49.173 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990206 344 23:03:49.173 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 345 23:03:49.213 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 346 23:03:49.213 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 347 23:03:49.213 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990207, seq# expected = 3288990207 348 23:04:15.200 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990207 349 23:04:15.200 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 350 23:04:15.250 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 351 23:04:15.250 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 352 23:04:15.250 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990208, seq# expected = 3288990208 353 23:06:57.432 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 354 23:11:57.900 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 355 23:13:03.011 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990208 356 23:13:03.011 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 357 23:13:03.051 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 358 23:13:03.051 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 359 23:13:03.051 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990209, seq# expected = 3288990209 360 23:15:49.292 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990209 361 23:15:49.292 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 362 23:15:49.332 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 363 23:15:49.332 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 364 23:15:49.332 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990210, seq# expected = 3288990210 365 23:16:57.903 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 366 23:19:16.597 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990210 367 23:19:16.597 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 368 23:19:16.647 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 369 23:19:16.647 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 370 23:19:16.647 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990211, seq# expected = 3288990211 371 23:21:58.835 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 372 23:26:58.845 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 373 23:27:52.354 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990211 374 23:27:52.354 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 375 23:27:52.394 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 376 23:27:52.394 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 377 23:27:52.394 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990212, seq# expected = 3288990212 378 23:31:59.717 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 379 23:34:18.931 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990212 380 23:34:18.931 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 381 23:34:18.971 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 382 23:34:18.971 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 383 23:34:18.971 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990213, seq# expected = 3288990213 384 23:37:00.158 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 385 23:39:51.910 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990213 386 23:39:51.910 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 387 23:39:51.950 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 388 23:39:51.950 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 389 23:39:51.950 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990214, seq# expected = 3288990214 390 23:42:00.098 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 391 23:42:19.126 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990214 392 23:42:19.126 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 393 23:42:19.166 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 394 23:42:19.166 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 395 23:42:19.166 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990215, seq# expected = 3288990215 396 23:47:01.050 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 397 23:49:16.248 07/13/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990215 398 23:49:16.248 07/13/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 399 23:49:16.288 07/13/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 400 23:49:16.288 07/13/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 401 23:49:16.288 07/13/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990216, seq# expected = 3288990216 402 23:52:01.501 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 403 23:57:02.443 07/13/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 404 00:02:01.892 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 405 00:04:18.593 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990216 406 00:04:18.593 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 407 00:04:18.633 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 408 00:04:18.633 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 409 00:04:18.633 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990217, seq# expected = 3288990217 410 00:07:02.323 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 411 00:08:40.477 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990217 412 00:08:40.477 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 413 00:08:40.517 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 414 00:08:40.517 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 415 00:08:40.517 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990218, seq# expected = 3288990218 416 00:08:50.993 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990218 417 00:08:50.993 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 418 00:08:51.043 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 419 00:08:51.043 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 420 00:08:51.043 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990219, seq# expected = 3288990219 421 00:10:47.664 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990219 422 00:10:47.664 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 423 00:10:47.704 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 424 00:10:47.714 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 425 00:10:47.714 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990220, seq# expected = 3288990220 426 00:12:02.784 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 427 00:17:03.716 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 428 00:19:17.408 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990220 429 00:19:17.408 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 430 00:19:17.448 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 431 00:19:17.448 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 432 00:19:17.448 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990221, seq# expected = 3288990221 433 00:22:03.615 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 434 00:27:04.020 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 435 00:32:04.965 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 436 00:34:17.667 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990221 437 00:34:17.667 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 438 00:34:17.708 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 439 00:34:17.708 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 440 00:34:17.708 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990222, seq# expected = 3288990222 441 00:37:05.400 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 442 00:42:05.845 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 443 00:47:06.290 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 444 00:52:06.245 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 445 00:57:07.180 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 446 01:02:07.625 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 447 01:07:07.570 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 448 01:12:08.495 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 449 01:17:08.930 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 450 01:22:09.365 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 451 01:27:09.800 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 452 01:32:10.214 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 453 01:37:10.159 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 454 01:42:11.084 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 455 01:42:37.122 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990222 456 01:42:37.122 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 457 01:42:37.162 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 458 01:42:37.162 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 459 01:42:37.162 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990223, seq# expected = 3288990223 460 01:47:11.519 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 461 01:51:25.898 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990223 462 01:51:25.898 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 463 01:51:25.948 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 464 01:51:25.948 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 465 01:51:25.948 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990224, seq# expected = 3288990224 466 01:52:11.464 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 467 01:57:12.399 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 468 02:02:12.834 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 469 02:04:15.512 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990224 470 02:04:15.512 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 471 02:04:15.582 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 472 02:04:15.582 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 473 02:04:15.582 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990225, seq# expected = 3288990225 474 02:07:13.269 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 475 02:12:13.214 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 476 02:14:40.437 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990225 477 02:14:40.437 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 478 02:14:40.477 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 479 02:14:40.487 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 480 02:14:40.487 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990226, seq# expected = 3288990226 481 02:17:14.670 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 482 02:22:15.105 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 483 02:27:15.029 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 484 02:30:15.791 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990226 485 02:30:15.791 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 486 02:30:15.841 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 487 02:30:15.841 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 488 02:30:15.841 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990227, seq# expected = 3288990227 489 02:32:14.974 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 490 02:34:19.644 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990227 491 02:34:19.644 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 492 02:34:19.694 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 493 02:34:19.694 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 494 02:34:19.694 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990228, seq# expected = 3288990228 495 02:37:15.909 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 496 02:42:16.835 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 497 02:47:16.769 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 498 02:49:14.941 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990228 499 02:49:14.941 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 500 02:49:14.981 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 501 02:49:14.981 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 502 02:49:14.981 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990229, seq# expected = 3288990229 503 02:52:17.705 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 504 02:57:17.649 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 505 03:02:18.095 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 506 03:04:15.765 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990229 507 03:04:15.765 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 508 03:04:15.815 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 509 03:04:15.815 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 510 03:04:15.815 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990230, seq# expected = 3288990230 511 03:07:18.530 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 512 03:12:18.975 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 513 03:15:52.784 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990230 514 03:15:52.784 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 515 03:15:52.834 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 516 03:15:52.834 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 517 03:15:52.834 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990231, seq# expected = 3288990231 518 03:17:18.919 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 519 03:19:15.077 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990231 520 03:19:15.077 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 521 03:19:15.127 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 522 03:19:15.127 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 523 03:19:15.127 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990232, seq# expected = 3288990232 524 03:22:19.845 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 525 03:27:20.280 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 526 03:32:21.215 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 527 03:34:17.383 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990232 528 03:34:17.383 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 529 03:34:17.434 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 530 03:34:17.434 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 531 03:34:17.434 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990233, seq# expected = 3288990233 532 03:37:21.150 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 533 03:42:22.085 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 534 03:47:22.031 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 535 03:48:39.146 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990233 536 03:48:39.146 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 537 03:48:39.196 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 538 03:48:39.196 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 539 03:48:39.196 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990234, seq# expected = 3288990234 540 03:49:19.715 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990234 541 03:49:19.715 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 542 03:49:19.755 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 543 03:49:19.755 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 544 03:49:19.755 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990235, seq# expected = 3288990235 545 03:52:22.469 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 546 03:57:22.915 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 547 04:02:23.360 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 548 04:03:50.986 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990235 549 04:03:50.986 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 550 04:03:51.036 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 551 04:03:51.036 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 552 04:03:51.036 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990236, seq# expected = 3288990236 553 04:04:16.523 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990236 554 04:04:16.523 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 555 04:04:16.573 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 556 04:04:16.573 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 557 04:04:16.573 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990237, seq# expected = 3288990237 558 04:07:23.795 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 559 04:12:24.230 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 560 04:15:47.524 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990237 561 04:15:47.524 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 562 04:15:47.574 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 563 04:15:47.574 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 564 04:15:47.574 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990238, seq# expected = 3288990238 565 04:17:24.665 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 566 04:19:16.326 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990238 567 04:19:16.326 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 568 04:19:16.376 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 569 04:19:16.376 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 570 04:19:16.376 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990239, seq# expected = 3288990239 571 04:19:53.380 07/14/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x4caea531 is about to expire, requesting a new one 572 04:19:53.380 07/14/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.91, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 573 04:19:53.380 07/14/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=8811DE2F) Initiator = ID=10.13.8.91 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 574 04:19:53.380 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 575 04:19:53.450 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 576 04:19:53.450 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 577 04:19:53.450 07/14/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 578 04:19:53.450 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 579 04:19:53.450 07/14/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=8811DE2F OUTBOUND SPI = 0x04D90AE4 INBOUND SPI = 0x5043AAC6) 580 04:19:53.450 07/14/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x04D90AE4 581 04:19:53.450 07/14/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x5043AAC6 582 04:19:53.450 07/14/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 583 04:19:53.891 07/14/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 584 04:19:53.891 07/14/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xe40ad904 into key list 585 04:19:53.891 07/14/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 586 04:19:53.891 07/14/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xc6aa4350 into key list 587 04:20:23.443 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 588 04:20:23.443 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 589 04:20:23.443 07/14/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 31A5AE4C INBOUND SPI = 1F47EA05) 590 04:20:23.443 07/14/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=A856E1D4 591 04:20:23.944 07/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x05ea471f 592 04:20:23.944 07/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x05ea471f 593 04:20:23.944 07/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x4caea531 594 04:20:23.944 07/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x4caea531 595 04:20:32.937 07/14/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xe40ad904 for inbound key with SPI=0xc6aa4350 596 04:22:25.100 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 597 04:27:25.545 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 598 04:32:25.980 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 599 04:34:16.139 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990239 600 04:34:16.139 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 601 04:34:16.189 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 602 04:34:16.189 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 603 04:34:16.189 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990240, seq# expected = 3288990240 604 04:37:26.415 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 605 04:39:48.630 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990240 606 04:39:48.630 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 607 04:39:48.671 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 608 04:39:48.671 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 609 04:39:48.671 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990241, seq# expected = 3288990241 610 04:42:26.870 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 611 04:47:27.315 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 612 04:49:17.464 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990241 613 04:49:17.464 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 614 04:49:17.504 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 615 04:49:17.504 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 616 04:49:17.504 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990242, seq# expected = 3288990242 617 04:51:50.195 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990242 618 04:51:50.195 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 619 04:51:50.235 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 620 04:51:50.235 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 621 04:51:50.235 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990243, seq# expected = 3288990243 622 04:52:27.249 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 623 04:57:28.185 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 624 05:02:28.630 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 625 05:02:50.161 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990243 626 05:02:50.161 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 627 05:02:50.201 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 628 05:02:50.201 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 629 05:02:50.201 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990244, seq# expected = 3288990244 630 05:04:16.285 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990244 631 05:04:16.285 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 632 05:04:16.326 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 633 05:04:16.326 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 634 05:04:16.326 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990245, seq# expected = 3288990245 635 05:07:29.065 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 636 05:12:29.500 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 637 05:17:24.427 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990245 638 05:17:24.427 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 639 05:17:24.477 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 640 05:17:24.477 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 641 05:17:24.477 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990246, seq# expected = 3288990246 642 05:17:29.434 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 643 05:19:16.088 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990246 644 05:19:16.088 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 645 05:19:16.138 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 646 05:19:16.138 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 647 05:19:16.138 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990247, seq# expected = 3288990247 648 05:22:30.890 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 649 05:27:31.325 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 650 05:32:31.260 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 651 05:34:17.914 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990247 652 05:34:17.914 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 653 05:34:17.964 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 654 05:34:17.964 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 655 05:34:17.964 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990248, seq# expected = 3288990248 656 05:37:32.205 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 657 05:42:31.649 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 658 05:43:08.202 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990248 659 05:43:08.202 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 660 05:43:08.242 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 661 05:43:08.242 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 662 05:43:08.242 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990249, seq# expected = 3288990249 663 05:47:32.595 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 664 05:49:15.744 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990249 665 05:49:15.744 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 666 05:49:15.784 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 667 05:49:15.784 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 668 05:49:15.784 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990250, seq# expected = 3288990250 669 05:52:33.030 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 670 05:57:32.974 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 671 06:02:33.911 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 672 06:04:15.059 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990250 673 06:04:15.059 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 674 06:04:15.099 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 675 06:04:15.099 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 676 06:04:15.099 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990251, seq# expected = 3288990251 677 06:07:34.348 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 678 06:12:34.783 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 679 06:17:35.218 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 680 06:19:19.378 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990251 681 06:19:19.378 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 682 06:19:19.419 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 683 06:19:19.419 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 684 06:19:19.419 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990252, seq# expected = 3288990252 685 06:22:35.663 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 686 06:26:05.977 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990252 687 06:26:05.977 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 688 06:26:06.027 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 689 06:26:06.027 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 690 06:26:06.027 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990253, seq# expected = 3288990253 691 06:27:35.607 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 692 06:30:45.892 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990253 693 06:30:45.892 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 694 06:30:45.933 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 695 06:30:45.933 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 696 06:30:45.933 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990254, seq# expected = 3288990254 697 06:32:36.042 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 698 06:34:18.701 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990254 699 06:34:18.711 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 700 06:34:18.751 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 701 06:34:18.751 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 702 06:34:18.751 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990255, seq# expected = 3288990255 703 06:37:36.988 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 704 06:41:33.340 07/14/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1077, flags 10h 705 06:41:50.365 07/14/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 1077, flags 10h 706 06:42:37.943 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 707 06:47:37.868 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 708 06:49:20.016 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990255 709 06:49:20.016 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 710 06:49:20.056 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 711 06:49:20.056 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 712 06:49:20.056 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990256, seq# expected = 3288990256 713 06:52:38.303 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 714 06:57:38.738 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 715 07:02:39.183 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 716 07:07:39.638 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 717 07:11:07.439 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990256 718 07:11:07.439 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 719 07:11:07.509 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 720 07:11:07.509 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 721 07:11:07.509 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990257, seq# expected = 3288990257 722 07:12:39.572 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 723 07:17:40.528 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 724 07:22:40.963 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 725 07:23:29.032 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990257 726 07:23:29.032 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 727 07:23:29.072 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 728 07:23:29.072 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 729 07:23:29.072 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990258, seq# expected = 3288990258 730 07:23:39.548 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990258 731 07:23:39.548 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 732 07:23:39.598 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 733 07:23:39.598 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 734 07:23:39.598 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990259, seq# expected = 3288990259 735 07:27:41.418 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 736 07:32:41.863 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 737 07:37:42.799 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 738 07:39:53.488 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990259 739 07:39:53.488 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 740 07:39:53.558 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 741 07:39:53.558 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 742 07:39:53.558 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990260, seq# expected = 3288990260 743 07:42:42.733 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 744 07:47:43.168 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 745 07:52:43.623 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 746 07:57:44.068 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 747 08:02:45.014 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 748 08:04:16.646 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990260 749 08:04:16.646 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 750 08:04:16.686 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 751 08:04:16.686 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 752 08:04:16.686 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990261, seq# expected = 3288990261 753 08:07:44.968 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 754 08:12:45.934 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 755 08:17:45.871 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 756 08:22:46.328 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 757 08:27:46.763 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 758 08:32:47.158 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 759 08:37:47.603 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 760 08:42:48.048 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 761 08:47:48.483 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 762 08:52:48.928 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 763 09:02:49.768 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 764 09:07:50.203 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 765 09:12:51.139 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 766 09:17:51.073 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 767 09:22:52.029 07/14/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1077, dst port 4005 768 09:25:24.870 07/14/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 3288990261 769 09:25:24.870 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 770 09:25:24.920 07/14/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 771 09:25:24.920 07/14/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 772 09:25:24.920 07/14/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 3288990262, seq# expected = 3288990262 773 09:25:57.758 07/14/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 774 09:25:57.758 07/14/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 775 09:25:57.758 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 776 09:25:57.758 07/14/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4D90AE4 INBOUND SPI = 5043AAC6) 777 09:25:57.758 07/14/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=8811DE2F 778 09:25:57.758 07/14/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=356952EC92C72E49 R_Cookie=D1E695D7123C285C) reason = DEL_REASON_RESET_SADB 779 09:25:57.758 07/14/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 780 09:25:57.758 07/14/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=356952EC92C72E49 R_Cookie=D1E695D7123C285C) reason = DEL_REASON_RESET_SADB 781 09:25:57.758 07/14/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 782 09:25:57.758 07/14/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 783 09:25:57.758 07/14/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 784 09:25:57.758 07/14/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1077 for TCP connection. 785 09:25:57.758 07/14/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 17:54:12 786 09:25:57.768 07/14/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 787 09:25:59.690 07/14/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 788 09:25:59.690 07/14/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 789 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xc6aa4350 790 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xc6aa4350 791 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xe40ad904 792 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xe40ad904 793 09:25:59.700 07/14/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1077, dst port 4005 794 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 795 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 796 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 797 09:25:59.700 07/14/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys