EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 11:15:27.313 07/31/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 11:15:27.333 07/31/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 11:15:27.333 07/31/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 11:15:27.353 07/31/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 2836 for TCP connection. 5 11:15:27.363 07/31/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 11:15:27.363 07/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 11:15:27.363 07/31/07 Sev=Info/6 IPSEC/0x6370002B Sent 4286 packets, 0 were fragmented. 8 11:15:27.363 07/31/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 2836, dst port 4005 9 11:15:28.324 07/31/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 2836 10 11:15:28.324 07/31/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 2836, dst port 4005 11 11:15:28.324 07/31/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 12 11:15:28.825 07/31/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 13 11:15:28.845 07/31/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 14 11:15:28.865 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 15 11:15:29.065 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 16 11:15:29.065 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 17 11:15:29.065 07/31/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 18 11:15:29.065 07/31/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 19 11:15:29.065 07/31/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 20 11:15:29.065 07/31/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 21 11:15:29.075 07/31/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 22 11:15:29.075 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 23 11:15:29.075 07/31/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 24 11:15:29.075 07/31/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 25 11:15:29.115 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 26 11:15:29.125 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 27 11:15:29.125 07/31/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 28 11:15:29.125 07/31/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=2F533229BC6B8EB6 R_Cookie=4DD9CE6AA8916C17) reason = DEL_REASON_LOAD_BALANCING 29 11:15:29.125 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 30 11:15:29.826 07/31/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=2F533229BC6B8EB6 R_Cookie=4DD9CE6AA8916C17) reason = DEL_REASON_LOAD_BALANCING 31 11:15:29.826 07/31/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 32 11:15:29.826 07/31/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 33 11:15:29.826 07/31/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 34 11:15:29.846 07/31/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 35 11:15:30.337 07/31/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 2836, dst port 4005 36 11:15:30.337 07/31/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 2836, dst port 4005 37 11:15:30.337 07/31/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 2836 38 11:15:30.337 07/31/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 2836, dst port 4005 39 11:15:30.337 07/31/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 40 11:15:30.838 07/31/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 41 11:15:30.858 07/31/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 42 11:15:30.878 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 43 11:15:31.078 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 44 11:15:31.078 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 45 11:15:31.078 07/31/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 46 11:15:31.078 07/31/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 47 11:15:31.078 07/31/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 48 11:15:31.078 07/31/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 49 11:15:31.088 07/31/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 50 11:15:31.088 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 51 11:15:31.088 07/31/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 52 11:15:31.088 07/31/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 53 11:15:31.138 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 54 11:15:31.138 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 55 11:15:31.138 07/31/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 56 11:15:42.905 07/31/07 Sev=Info/4 CM/0x63100017 xAuth application returned 57 11:15:42.905 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 58 11:15:45.779 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 59 11:15:45.779 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 60 11:15:45.779 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 61 11:15:45.789 07/31/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 62 11:15:45.829 07/31/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 63 11:15:45.829 07/31/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 64 11:15:45.829 07/31/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 65 11:15:45.839 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 66 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 67 11:15:46.811 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 68 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.30 69 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 70 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 71 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 72 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 73 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 74 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 75 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 76 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 77 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 78 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 79 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 80 11:15:46.811 07/31/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 81 11:15:46.811 07/31/07 Sev=Info/4 CM/0x63100019 Mode Config data received 82 11:15:46.831 07/31/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.30, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 83 11:15:46.831 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 84 11:15:46.881 07/31/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 85 11:15:46.881 07/31/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 86 11:15:46.971 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 87 11:15:46.971 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 88 11:15:46.971 07/31/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 89 11:15:46.971 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 90 11:15:46.971 07/31/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=ED118B30 OUTBOUND SPI = 0x654BB9B3 INBOUND SPI = 0xA0C1F028) 91 11:15:46.971 07/31/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x654BB9B3 92 11:15:46.971 07/31/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0xA0C1F028 93 11:15:47.572 07/31/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.30/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 94 11:15:47.642 07/31/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 95 11:15:47.682 07/31/07 Sev=Info/4 CM/0x6310001A One secure connection established 96 11:15:48.012 07/31/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.13.8.30, 192.168.186.1, 192.168.121.1. 97 11:15:48.012 07/31/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.30. Current address(es): 192.168.1.102, 10.13.8.30, 192.168.186.1, 192.168.121.1. 98 11:15:48.062 07/31/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 99 11:15:48.062 07/31/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xb3b94b65 into key list 100 11:15:48.062 07/31/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 101 11:15:48.062 07/31/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x28f0c1a0 into key list 102 11:15:48.062 07/31/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.30 103 11:16:28.411 07/31/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xb3b94b65 for inbound key with SPI=0x28f0c1a0 104 11:17:32.507 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341707 105 11:17:32.507 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 106 11:17:32.557 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 107 11:17:32.557 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 108 11:17:32.557 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341708, seq# expected = 1828341708 109 11:17:43.023 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341708 110 11:17:43.023 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 111 11:17:43.083 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 112 11:17:43.083 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 113 11:17:43.083 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341709, seq# expected = 1828341709 114 11:17:53.539 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341709 115 11:17:53.539 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 116 11:17:53.619 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 117 11:17:53.619 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 118 11:17:53.619 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341710, seq# expected = 1828341710 119 11:19:49.216 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341710 120 11:19:49.216 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 121 11:19:49.266 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 122 11:19:49.266 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 123 11:19:49.266 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341711, seq# expected = 1828341711 124 11:20:31.280 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 125 11:23:42.553 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341711 126 11:23:42.553 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 127 11:23:42.634 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 128 11:23:42.634 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 129 11:23:42.634 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341712, seq# expected = 1828341712 130 11:24:38.630 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341712 131 11:24:38.630 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 132 11:24:38.680 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 133 11:24:38.680 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 134 11:24:38.680 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341713, seq# expected = 1828341713 135 11:24:54.151 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341713 136 11:24:54.151 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 137 11:24:54.211 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 138 11:24:54.211 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 139 11:24:54.211 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341714, seq# expected = 1828341714 140 11:25:31.703 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 141 11:30:32.614 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 142 11:35:33.103 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 143 11:40:33.260 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 144 11:44:21.185 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341714 145 11:44:21.185 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 146 11:44:21.245 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 147 11:44:21.245 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 148 11:44:21.245 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341715, seq# expected = 1828341715 149 11:45:32.819 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 150 11:48:44.176 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341715 151 11:48:44.176 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 152 11:48:44.226 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 153 11:48:44.226 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 154 11:48:44.226 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341716, seq# expected = 1828341716 155 11:50:32.889 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 156 11:55:33.440 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 157 12:00:33.500 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 158 12:04:24.942 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341716 159 12:04:24.942 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 160 12:04:24.992 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 161 12:04:24.992 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 162 12:04:24.992 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341717, seq# expected = 1828341717 163 12:05:33.069 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 164 12:10:33.620 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 165 12:15:34.191 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 166 12:20:33.750 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 167 12:25:34.551 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 168 12:30:34.519 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 169 12:33:41.318 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341717 170 12:33:41.318 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 171 12:33:41.368 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 172 12:33:41.368 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 173 12:33:41.368 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341718, seq# expected = 1828341718 174 12:35:35.197 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 175 12:40:34.879 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 176 12:45:35.034 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 177 12:50:35.747 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 178 12:52:46.220 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341718 179 12:52:46.220 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 180 12:52:46.300 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 181 12:52:46.300 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 182 12:52:46.300 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341719, seq# expected = 1828341719 183 12:55:36.184 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 184 13:00:36.621 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 185 13:03:38.593 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341719 186 13:03:38.593 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 187 13:03:38.643 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 188 13:03:38.643 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 189 13:03:38.643 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341720, seq# expected = 1828341720 190 13:05:36.568 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 191 13:10:37.005 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 192 13:15:37.942 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 193 13:20:37.471 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 194 13:25:38.091 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 195 13:30:37.777 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 196 13:33:43.506 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341720 197 13:33:43.516 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 198 13:33:43.586 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 199 13:33:43.586 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 200 13:33:43.586 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341721, seq# expected = 1828341721 201 13:35:37.463 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 202 13:40:38.163 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 203 13:41:40.920 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341721 204 13:41:40.920 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 205 13:41:40.970 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 206 13:41:40.970 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 207 13:41:40.970 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341722, seq# expected = 1828341722 208 13:42:26.599 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341722 209 13:42:26.599 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 210 13:42:26.659 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 211 13:42:26.659 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 212 13:42:26.659 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341723, seq# expected = 1828341723 213 13:42:37.642 07/31/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 137.69.115.16, src port 4005, dst port 2836, flags 10h 214 13:45:37.850 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 215 13:48:48.608 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341723 216 13:48:48.608 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 217 13:48:48.688 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 218 13:48:48.688 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 219 13:48:48.688 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341724, seq# expected = 1828341724 220 13:50:38.646 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 221 13:52:40.055 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341724 222 13:52:40.055 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 223 13:52:40.124 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 224 13:52:40.124 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 225 13:52:40.124 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341725, seq# expected = 1828341725 226 14:00:39.470 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 227 14:05:39.055 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 228 14:10:39.563 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 229 14:15:39.739 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 230 14:18:39.893 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341725 231 14:18:39.893 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 232 14:18:39.954 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 233 14:18:39.954 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 234 14:18:39.954 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341726, seq# expected = 1828341726 235 14:20:39.997 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 236 14:25:39.754 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 237 14:30:40.523 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 238 14:35:40.300 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 239 14:40:40.558 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 240 14:45:40.589 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 241 14:50:41.314 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 242 14:52:36.513 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341726 243 14:52:36.513 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 244 14:52:36.573 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 245 14:52:36.573 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 246 14:52:36.573 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341727, seq# expected = 1828341727 247 14:55:40.348 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 248 15:00:41.225 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 249 15:03:41.524 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341727 250 15:03:41.524 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 251 15:03:41.615 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 252 15:03:41.615 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 253 15:03:41.615 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341728, seq# expected = 1828341728 254 15:05:41.240 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 255 15:10:41.746 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 256 15:15:41.780 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 257 15:20:42.104 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 258 15:25:42.027 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 259 15:30:42.950 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 260 15:33:43.204 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341728 261 15:33:43.214 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 262 15:33:43.284 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 263 15:33:43.284 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 264 15:33:43.284 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341729, seq# expected = 1828341729 265 15:35:42.873 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 266 15:39:19.197 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341729 267 15:39:19.197 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 268 15:39:24.204 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341730 269 15:39:24.204 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 270 15:39:24.264 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 271 15:39:24.264 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 272 15:39:24.264 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341731, seq# expected = 1828341731 273 15:40:36.306 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341731 274 15:40:36.306 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 275 15:40:36.366 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 276 15:40:36.366 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 277 15:40:36.366 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341732, seq# expected = 1828341732 278 15:40:42.815 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 279 15:45:44.209 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 280 15:48:41.469 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341732 281 15:48:41.469 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 282 15:48:41.539 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 283 15:48:41.539 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 284 15:48:41.539 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341733, seq# expected = 1828341733 285 15:50:44.148 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 286 15:52:38.852 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341733 287 15:52:38.852 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 288 15:52:38.912 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 289 15:52:38.912 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 290 15:52:38.912 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341734, seq# expected = 1828341734 291 15:55:44.150 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 292 16:00:45.092 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 293 16:03:43.349 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341734 294 16:03:43.349 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 295 16:03:43.399 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 296 16:03:43.399 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 297 16:03:43.399 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341735, seq# expected = 1828341735 298 16:05:45.524 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 299 16:08:56.299 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341735 300 16:08:56.299 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 301 16:08:56.389 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 302 16:08:56.389 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 303 16:08:56.389 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341736, seq# expected = 1828341736 304 16:10:44.965 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 305 16:15:45.898 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 306 16:20:46.340 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 307 16:25:47.270 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 308 16:30:47.198 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 309 16:31:32.272 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341736 310 16:31:32.272 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 311 16:31:32.322 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 312 16:31:32.322 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 313 16:31:32.322 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341737, seq# expected = 1828341737 314 16:32:38.357 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341737 315 16:32:38.367 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 316 16:32:43.875 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341738 317 16:32:43.875 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 318 16:32:43.935 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 319 16:32:43.935 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 320 16:32:43.935 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341739, seq# expected = 1828341739 321 16:32:59.888 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341739 322 16:32:59.888 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 323 16:32:59.938 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 324 16:32:59.938 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 325 16:32:59.938 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341740, seq# expected = 1828341740 326 16:33:57.481 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341740 327 16:33:57.481 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 328 16:33:57.541 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 329 16:33:57.541 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 330 16:33:57.541 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341741, seq# expected = 1828341741 331 16:34:08.497 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341741 332 16:34:08.497 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 333 16:34:08.557 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 334 16:34:08.557 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 335 16:34:08.557 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341742, seq# expected = 1828341742 336 16:34:24.009 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341742 337 16:34:24.009 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 338 16:34:24.079 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 339 16:34:24.079 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 340 16:34:24.079 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341743, seq# expected = 1828341743 341 16:34:40.032 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341743 342 16:34:40.032 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 343 16:34:40.092 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 344 16:34:40.092 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 345 16:34:40.092 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341744, seq# expected = 1828341744 346 16:35:07.071 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341744 347 16:35:07.071 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 348 16:35:07.131 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 349 16:35:07.131 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 350 16:35:07.131 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341745, seq# expected = 1828341745 351 16:35:23.094 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341745 352 16:35:23.094 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 353 16:35:23.174 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 354 16:35:23.174 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 355 16:35:23.174 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341746, seq# expected = 1828341746 356 16:35:33.609 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341746 357 16:35:33.609 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 358 16:35:33.670 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 359 16:35:33.670 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 360 16:35:33.670 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341747, seq# expected = 1828341747 361 16:35:47.139 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 362 16:35:54.139 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341747 363 16:35:54.139 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 364 16:35:54.189 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 365 16:35:54.189 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 366 16:35:54.189 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341748, seq# expected = 1828341748 367 16:36:29.690 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341748 368 16:36:29.690 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 369 16:36:29.760 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 370 16:36:29.760 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 371 16:36:29.760 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341749, seq# expected = 1828341749 372 16:37:31.279 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341749 373 16:37:31.279 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 374 16:37:31.339 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 375 16:37:31.339 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 376 16:37:31.339 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341750, seq# expected = 1828341750 377 16:37:53.340 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341750 378 16:37:53.340 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 379 16:37:53.400 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 380 16:37:53.400 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 381 16:37:53.400 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341751, seq# expected = 1828341751 382 16:38:35.872 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341751 383 16:38:35.872 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 384 16:38:35.932 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 385 16:38:35.932 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 386 16:38:35.932 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341752, seq# expected = 1828341752 387 16:38:56.912 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341752 388 16:38:56.912 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 389 16:38:56.962 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 390 16:38:56.962 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 391 16:38:56.962 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341753, seq# expected = 1828341753 392 16:40:40.050 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341753 393 16:40:40.050 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 394 16:40:40.120 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 16:40:40.120 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 396 16:40:40.120 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341754, seq# expected = 1828341754 397 16:40:48.072 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 398 16:45:49.004 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 399 16:45:56.034 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341754 400 16:45:56.034 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 401 16:45:56.085 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 402 16:45:56.085 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 403 16:45:56.085 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341755, seq# expected = 1828341755 404 16:50:49.446 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 405 16:52:41.107 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341755 406 16:52:41.107 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 407 16:52:41.177 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 408 16:52:41.177 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 409 16:52:41.177 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341756, seq# expected = 1828341756 410 16:55:49.888 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 411 17:00:49.816 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 412 17:04:42.648 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341756 413 17:04:42.648 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 414 17:04:42.729 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 415 17:04:42.729 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 416 17:04:42.729 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341757, seq# expected = 1828341757 417 17:05:49.755 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 418 17:10:50.688 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 419 17:15:51.120 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 420 17:18:39.362 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341757 421 17:18:39.362 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 422 17:18:39.422 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 423 17:18:39.422 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 424 17:18:39.422 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341758, seq# expected = 1828341758 425 17:20:51.061 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 426 17:25:51.994 07/31/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 2836, dst port 4005 427 17:27:06.591 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341758 428 17:27:06.591 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 429 17:27:06.671 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 430 17:27:06.671 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 431 17:27:06.671 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341759, seq# expected = 1828341759 432 17:27:22.113 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341759 433 17:27:22.113 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 434 17:27:22.163 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 435 17:27:22.163 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 436 17:27:22.163 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341760, seq# expected = 1828341760 437 17:27:42.643 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341760 438 17:27:42.643 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 439 17:27:42.693 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 440 17:27:42.693 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 441 17:27:42.693 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341761, seq# expected = 1828341761 442 17:28:08.180 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341761 443 17:28:08.180 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 444 17:28:08.230 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 445 17:28:08.230 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 446 17:28:08.230 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341762, seq# expected = 1828341762 447 17:28:34.217 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341762 448 17:28:34.217 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 449 17:28:34.287 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 450 17:28:34.287 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 451 17:28:34.287 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341763, seq# expected = 1828341763 452 17:28:44.742 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341763 453 17:28:44.742 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 454 17:28:44.792 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 455 17:28:44.792 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 456 17:28:44.792 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341764, seq# expected = 1828341764 457 17:29:05.272 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341764 458 17:29:05.272 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 459 17:29:05.332 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 460 17:29:05.332 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 461 17:29:05.332 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341765, seq# expected = 1828341765 462 17:29:16.287 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341765 463 17:29:16.287 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 464 17:29:16.338 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 465 17:29:16.338 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 466 17:29:16.338 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341766, seq# expected = 1828341766 467 17:29:41.834 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341766 468 17:29:41.834 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 469 17:29:41.904 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 470 17:29:41.904 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 471 17:29:41.904 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341767, seq# expected = 1828341767 472 17:29:52.349 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341767 473 17:29:52.349 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 474 17:29:52.399 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 475 17:29:52.399 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 476 17:29:52.399 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341768, seq# expected = 1828341768 477 17:30:08.322 07/31/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 1828341768 478 17:30:08.322 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 479 17:30:08.382 07/31/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 480 17:30:08.382 07/31/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 481 17:30:08.382 07/31/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 1828341769, seq# expected = 1828341769 482 17:30:10.455 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 483 17:30:10.455 07/31/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 654BB9B3 INBOUND SPI = A0C1F028) 484 17:30:10.455 07/31/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=ED118B30 485 17:30:10.455 07/31/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=D457B3F754E7E030 R_Cookie=9CEE7F5EB3DC37C2) reason = DEL_REASON_RESET_SADB 486 17:30:10.455 07/31/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 487 17:30:10.455 07/31/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=D457B3F754E7E030 R_Cookie=9CEE7F5EB3DC37C2) reason = DEL_REASON_RESET_SADB 488 17:30:10.455 07/31/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 489 17:30:10.455 07/31/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 490 17:30:10.465 07/31/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 491 17:30:10.465 07/31/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 2836 for TCP connection. 492 17:30:10.465 07/31/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 6:14:23 493 17:30:10.465 07/31/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 494 17:30:10.495 07/31/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 495 17:30:11.997 07/31/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 496 08:55:19.062 08/01/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 497 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x28f0c1a0 498 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x28f0c1a0 499 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xb3b94b65 500 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xb3b94b65 501 08:55:21.165 08/01/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 2836, dst port 4005 502 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 503 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 504 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 505 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 506 08:55:21.165 08/01/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys