EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 23:24:13.272 08/20/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 23:24:13.462 08/20/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 23:24:13.462 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 23:24:13.553 08/20/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1359 for TCP connection. 5 23:24:13.553 08/20/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 23:24:13.553 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 23:24:13.553 08/20/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1359, dst port 4005 8 23:24:14.504 08/20/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1359 9 23:24:14.504 08/20/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1359, dst port 4005 10 23:24:14.504 08/20/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 23:24:15.015 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 23:24:15.025 08/20/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 23:24:15.065 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 23:24:15.255 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 23:24:15.255 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 23:24:15.255 08/20/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 23:24:15.255 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 23:24:15.255 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 23:24:15.255 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 23:24:15.275 08/20/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 23:24:15.275 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 23:24:15.275 08/20/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 23:24:15.275 08/20/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 23:24:15.315 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 23:24:15.315 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 23:24:15.315 08/20/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 23:24:15.315 08/20/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=E9F37414D79EFBC2 R_Cookie=E170CD2C9751EC93) reason = DEL_REASON_LOAD_BALANCING 28 23:24:15.315 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 23:24:16.016 08/20/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=E9F37414D79EFBC2 R_Cookie=E170CD2C9751EC93) reason = DEL_REASON_LOAD_BALANCING 30 23:24:16.016 08/20/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 23:24:16.016 08/20/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 23:24:16.016 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 23:24:16.026 08/20/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 23:24:16.517 08/20/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1359, dst port 4005 35 23:24:16.517 08/20/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1359, dst port 4005 36 23:24:16.517 08/20/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1359 37 23:24:16.517 08/20/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1359, dst port 4005 38 23:24:16.517 08/20/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 23:24:17.008 08/20/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 23:24:17.028 08/20/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 23:24:17.058 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 23:24:17.278 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 23:24:17.278 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 23:24:17.278 08/20/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 23:24:17.278 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 23:24:17.278 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 23:24:17.278 08/20/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 23:24:17.278 08/20/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 23:24:17.278 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 23:24:17.278 08/20/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 23:24:17.278 08/20/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 23:24:17.318 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 23:24:17.318 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 23:24:17.318 08/20/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 23:24:26.041 08/20/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 23:24:26.041 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 23:24:30.647 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 58 23:24:30.647 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 59 23:24:30.647 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 60 23:24:30.647 08/20/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 23:24:30.707 08/20/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 23:24:30.707 08/20/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 23:24:30.707 08/20/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 23:24:30.707 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 65 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 66 23:24:31.609 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 67 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.13.8.39 68 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.192.0 69 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 137.69.224.15 70 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.221.12.10 71 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas West Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_INCLUDE_LOCAL_LAN (# of local_nets), value = 0x00000001 79 23:24:31.609 08/20/07 Sev=Info/5 IKE/0x6300000F LOCAL_NET #1 subnet = 192.168.1.0 mask = 255.255.255.0 protocol = 0 src port = 0 dest port=0 80 23:24:31.619 08/20/07 Sev=Info/4 CM/0x63100019 Mode Config data received 81 23:24:31.629 08/20/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.39, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 82 23:24:31.629 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 83 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 84 23:24:31.689 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 85 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 14 seconds, setting expiry to 86386 seconds from now 87 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 88 23:24:31.689 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 89 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 23:24:31.689 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 91 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=99EB2AB5 OUTBOUND SPI = 0x2D9E8EE7 INBOUND SPI = 0x54FA90F0) 92 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x2D9E8EE7 93 23:24:31.689 08/20/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x54FA90F0 94 23:24:34.743 08/20/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.13.8.39/255.255.192.0 DNS=137.69.224.15,128.221.12.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 23:24:34.813 08/20/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 23:24:34.833 08/20/07 Sev=Info/4 CM/0x6310001A One secure connection established 97 23:24:34.903 08/20/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.13.8.39, 192.168.186.1, 192.168.121.1. 98 23:24:34.903 08/20/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.13.8.39. Current address(es): 192.168.1.102, 10.13.8.39, 192.168.186.1, 192.168.121.1. 99 23:24:35.114 08/20/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 100 23:24:35.114 08/20/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 101 23:24:35.114 08/20/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 23:24:35.114 08/20/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xe78e9e2d into key list 103 23:24:35.114 08/20/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 23:24:35.114 08/20/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf090fa54 into key list 105 23:24:35.114 08/20/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xe78e9e2d for inbound key with SPI=0xf090fa54 106 23:24:35.114 08/20/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.13.8.39 107 23:26:16.594 08/20/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093746 108 23:26:16.594 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 109 23:26:16.654 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 110 23:26:16.654 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 111 23:26:16.654 08/20/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093747, seq# expected = 2267093747 112 23:27:17.120 08/20/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093747 113 23:27:17.120 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 114 23:27:17.170 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 115 23:27:17.170 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 116 23:27:17.170 08/20/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093748, seq# expected = 2267093748 117 23:29:18.174 08/20/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 118 23:30:18.729 08/20/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093748 119 23:30:18.729 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 120 23:30:18.779 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 121 23:30:18.779 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 122 23:30:18.779 08/20/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093749, seq# expected = 2267093749 123 23:30:29.244 08/20/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093749 124 23:30:29.244 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 125 23:30:29.294 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 126 23:30:29.294 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 127 23:30:29.294 08/20/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093750, seq# expected = 2267093750 128 23:32:20.904 08/20/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093750 129 23:32:20.904 08/20/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 130 23:32:20.954 08/20/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 131 23:32:20.954 08/20/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 132 23:32:20.954 08/20/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093751, seq# expected = 2267093751 133 23:34:17.572 08/20/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 134 23:39:18.535 08/20/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 135 23:44:18.977 08/20/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 136 23:49:19.419 08/20/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 137 23:54:19.881 08/20/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 138 23:59:20.302 08/20/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 139 00:04:20.644 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 140 00:09:20.992 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 141 00:14:21.350 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 142 00:19:21.425 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 143 00:24:21.459 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 144 00:29:21.890 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 145 00:34:22.343 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 146 00:39:22.842 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 147 00:44:23.782 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 148 00:49:23.740 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 149 00:54:24.194 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 150 00:59:25.133 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 151 01:04:25.061 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 152 01:09:25.529 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 153 01:14:25.971 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 154 01:19:26.904 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 155 01:24:27.366 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 156 01:29:27.818 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 157 01:34:27.759 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 158 01:39:28.201 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 159 01:44:28.653 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 160 01:49:29.085 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 161 01:54:29.558 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 162 01:57:15.306 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093751 163 01:57:15.306 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 164 01:57:15.376 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 165 01:57:15.376 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 166 01:57:15.376 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093752, seq# expected = 2267093752 167 01:59:30.020 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 168 02:00:18.599 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093752 169 02:00:18.599 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 170 02:00:18.639 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 171 02:00:18.639 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 172 02:00:18.639 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093753, seq# expected = 2267093753 173 02:04:30.512 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 174 02:09:30.954 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 175 02:12:18.214 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093753 176 02:12:18.214 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 177 02:12:18.264 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 178 02:12:18.264 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 179 02:12:18.264 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093754, seq# expected = 2267093754 180 02:14:31.426 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 181 02:19:31.873 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 182 02:24:32.804 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 183 02:27:17.051 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093754 184 02:27:17.051 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 185 02:27:22.058 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093755 186 02:27:22.058 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 187 02:27:22.108 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 188 02:27:22.108 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 189 02:27:22.108 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093756, seq# expected = 2267093756 190 02:29:32.766 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 191 02:34:33.238 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 192 02:35:32.363 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093756 193 02:35:32.363 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 194 02:35:32.403 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 195 02:35:32.403 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 196 02:35:32.403 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093757, seq# expected = 2267093757 197 02:35:42.878 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093757 198 02:35:42.878 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 199 02:35:42.928 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 200 02:35:42.928 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 201 02:35:42.928 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093758, seq# expected = 2267093758 202 02:39:33.730 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 203 02:42:16.023 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093758 204 02:42:16.023 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 205 02:42:16.073 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 206 02:42:16.073 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 207 02:42:16.073 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093759, seq# expected = 2267093759 208 02:44:33.771 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 209 02:46:24.441 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093759 210 02:46:24.441 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 211 02:46:24.501 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 212 02:46:24.501 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 213 02:46:24.501 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093760, seq# expected = 2267093760 214 02:49:34.223 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 215 02:54:34.649 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 216 02:57:08.881 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093760 217 02:57:08.881 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 218 02:57:08.931 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 219 02:57:08.931 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 220 02:57:08.931 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093761, seq# expected = 2267093761 221 02:59:35.091 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 222 03:09:35.565 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 223 03:14:35.997 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 224 03:19:36.429 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 225 03:21:08.061 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093761 226 03:21:08.061 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 227 03:21:08.111 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 228 03:21:08.111 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 229 03:21:08.111 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093762, seq# expected = 2267093762 230 03:24:36.860 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 231 03:27:18.091 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093762 232 03:27:18.091 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 233 03:27:18.141 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 234 03:27:18.141 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 235 03:27:18.141 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093763, seq# expected = 2267093763 236 03:29:20.265 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093763 237 03:29:20.265 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 238 03:29:20.335 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 239 03:29:20.335 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 240 03:29:20.335 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093764, seq# expected = 2267093764 241 03:29:37.290 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 242 03:33:08.093 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093764 243 03:33:08.093 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 244 03:33:08.173 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 245 03:33:08.173 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 246 03:33:08.173 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093765, seq# expected = 2267093765 247 03:34:37.221 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 248 03:39:38.655 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 249 03:40:25.722 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093765 250 03:40:25.722 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 251 03:40:25.762 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 252 03:40:25.762 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 253 03:40:25.762 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093766, seq# expected = 2267093766 254 03:44:38.596 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 255 03:49:39.028 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 256 03:54:39.460 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 257 03:57:16.185 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093766 258 03:57:16.185 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 259 03:57:16.235 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 260 03:57:16.235 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 261 03:57:16.235 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093767, seq# expected = 2267093767 262 03:59:40.390 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 263 04:04:40.829 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 264 04:09:40.750 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 265 04:12:15.983 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093767 266 04:12:15.983 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 267 04:12:16.023 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 268 04:12:16.023 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 269 04:12:16.023 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093768, seq# expected = 2267093768 270 04:14:41.202 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 271 04:19:42.135 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 272 04:24:42.066 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 273 04:27:18.291 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093768 274 04:27:18.301 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 275 04:27:18.341 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 276 04:27:18.341 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 277 04:27:18.341 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093769, seq# expected = 2267093769 278 04:29:43.009 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 279 04:33:03.797 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093769 280 04:33:03.797 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 281 04:33:03.857 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 282 04:33:03.857 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 283 04:33:03.857 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093770, seq# expected = 2267093770 284 04:34:42.449 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 285 04:36:11.577 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093770 286 04:36:11.577 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 287 04:36:11.627 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 288 04:36:11.627 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 289 04:36:11.627 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093771, seq# expected = 2267093771 290 04:39:43.382 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 291 04:42:14.599 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093771 292 04:42:14.599 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 293 04:42:14.639 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 294 04:42:14.639 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 295 04:42:14.639 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093772, seq# expected = 2267093772 296 04:44:43.814 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 297 04:49:44.256 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 298 04:54:44.177 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 299 04:57:03.878 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093772 300 04:57:03.878 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 301 04:57:03.918 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 302 04:57:03.928 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 303 04:57:03.928 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093773, seq# expected = 2267093773 304 04:57:14.393 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093773 305 04:57:14.393 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 306 04:57:14.433 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 307 04:57:14.433 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 308 04:57:14.433 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093774, seq# expected = 2267093774 309 04:59:44.619 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 310 05:00:44.706 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093774 311 05:00:44.716 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 312 05:00:44.756 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 313 05:00:44.756 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 314 05:00:44.756 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093775, seq# expected = 2267093775 315 05:04:45.061 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 316 05:09:06.928 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093775 317 05:09:06.928 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 318 05:09:06.978 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 319 05:09:06.978 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 320 05:09:06.978 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093776, seq# expected = 2267093776 321 05:09:45.493 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 322 05:12:15.219 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093776 323 05:12:15.219 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 324 05:12:15.259 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 325 05:12:15.259 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 326 05:12:15.259 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093777, seq# expected = 2267093777 327 05:14:46.426 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 328 05:19:46.858 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 329 05:21:01.465 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093777 330 05:21:01.475 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 331 05:21:01.515 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 332 05:21:01.515 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 333 05:21:01.515 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093778, seq# expected = 2267093778 334 05:24:47.300 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 335 05:27:18.027 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093778 336 05:27:18.027 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 337 05:27:23.034 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093779 338 05:27:23.034 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 339 05:27:23.084 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 340 05:27:23.084 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 341 05:27:23.084 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093780, seq# expected = 2267093780 342 05:29:39.230 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093780 343 05:29:39.230 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 344 05:29:39.280 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 345 05:29:39.280 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 346 05:29:39.280 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093781, seq# expected = 2267093781 347 05:29:47.251 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 348 05:33:05.526 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093781 349 05:33:05.526 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 350 05:33:05.597 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 351 05:33:05.597 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 352 05:33:05.597 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093782, seq# expected = 2267093782 353 05:34:08.116 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093782 354 05:34:08.116 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 355 05:34:13.134 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093783 356 05:34:13.134 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 357 05:34:13.174 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 358 05:34:13.174 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 359 05:34:13.174 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093784, seq# expected = 2267093784 360 05:34:47.673 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 361 05:39:48.606 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 362 05:40:40.691 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093784 363 05:40:40.691 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 364 05:40:40.741 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 365 05:40:40.741 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 366 05:40:40.741 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093785, seq# expected = 2267093785 367 05:42:17.831 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093785 368 05:42:17.831 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 369 05:42:17.871 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 370 05:42:17.871 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 371 05:42:17.871 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093786, seq# expected = 2267093786 372 05:44:49.048 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 373 05:45:05.572 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093786 374 05:45:05.572 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 375 05:45:05.622 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 376 05:45:05.622 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 377 05:45:05.622 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093787, seq# expected = 2267093787 378 05:48:50.906 08/21/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0xe78e9e2d is about to expire, requesting a new one 379 05:48:50.906 08/21/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.13.8.39, GW IP = 137.69.115.16, Remote IP = 0.0.0.0 380 05:48:50.906 08/21/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=5709CE8E) Initiator = ID=10.13.8.39 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 381 05:48:50.906 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 137.69.115.16 382 05:48:50.956 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 383 05:48:50.956 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 137.69.115.16 384 05:48:50.956 08/21/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 385 05:48:50.956 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 137.69.115.16 386 05:48:50.956 08/21/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=5709CE8E OUTBOUND SPI = 0x2DE611EC INBOUND SPI = 0x1777F2F5) 387 05:48:50.956 08/21/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x2DE611EC 388 05:48:50.956 08/21/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x1777F2F5 389 05:48:50.956 08/21/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 390 05:48:51.417 08/21/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 391 05:48:51.417 08/21/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xec11e62d into key list 392 05:48:51.417 08/21/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 393 05:48:51.417 08/21/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xf5f27717 into key list 394 05:49:20.959 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 395 05:49:20.959 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 137.69.115.16 396 05:49:20.959 08/21/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2D9E8EE7 INBOUND SPI = 54FA90F0) 397 05:49:20.959 08/21/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=99EB2AB5 398 05:49:21.450 08/21/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf090fa54 399 05:49:21.450 08/21/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf090fa54 400 05:49:21.450 08/21/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xe78e9e2d 401 05:49:21.450 08/21/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xe78e9e2d 402 05:49:48.989 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 403 05:49:49.991 08/21/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0xec11e62d for inbound key with SPI=0xf5f27717 404 05:54:49.922 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 405 05:57:03.614 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093787 406 05:57:03.614 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 407 05:57:03.664 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 408 05:57:03.664 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 409 05:57:03.664 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093788, seq# expected = 2267093788 410 05:57:14.129 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093788 411 05:57:14.129 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 412 05:57:14.169 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 413 05:57:14.169 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 414 05:57:14.179 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093789, seq# expected = 2267093789 415 05:59:50.354 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 416 06:04:50.315 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 417 06:09:03.670 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093789 418 06:09:03.670 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 419 06:09:03.720 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 420 06:09:03.720 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 421 06:09:03.720 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093790, seq# expected = 2267093790 422 06:09:50.737 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 423 06:12:16.948 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093790 424 06:12:16.948 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 425 06:12:16.998 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 426 06:12:16.998 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 427 06:12:16.998 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093791, seq# expected = 2267093791 428 06:14:51.670 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 429 06:19:52.102 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 430 06:24:52.544 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 431 06:27:14.759 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093791 432 06:27:14.759 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 433 06:27:14.799 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 434 06:27:14.799 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 435 06:27:14.799 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093792, seq# expected = 2267093792 436 06:28:06.823 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093792 437 06:28:06.823 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 438 06:28:06.874 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 439 06:28:06.874 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 440 06:28:06.874 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093793, seq# expected = 2267093793 441 06:29:52.475 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 442 06:33:02.759 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093793 443 06:33:02.759 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 444 06:33:02.809 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 445 06:33:02.809 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 446 06:33:02.809 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093794, seq# expected = 2267093794 447 06:34:52.917 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 448 06:39:53.850 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 449 06:42:08.043 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093794 450 06:42:08.043 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 451 06:42:08.093 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 452 06:42:08.093 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 453 06:42:08.093 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093795, seq# expected = 2267093795 454 06:44:53.791 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 455 06:49:54.724 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 456 06:54:55.156 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 457 06:57:17.361 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093795 458 06:57:17.371 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 459 06:57:17.411 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 460 06:57:17.411 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 461 06:57:17.411 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093796, seq# expected = 2267093796 462 06:59:55.588 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 463 07:04:56.040 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 464 07:09:04.387 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093796 465 07:09:04.387 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 466 07:09:04.427 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 467 07:09:04.427 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 468 07:09:04.427 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093797, seq# expected = 2267093797 469 07:09:56.462 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 470 07:12:16.674 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093797 471 07:12:16.674 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 472 07:12:16.724 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 473 07:12:16.724 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 474 07:12:16.724 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093798, seq# expected = 2267093798 475 07:14:56.904 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 476 07:19:39.310 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093798 477 07:19:39.310 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 478 07:19:39.360 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 479 07:19:39.360 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 480 07:19:39.360 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093799, seq# expected = 2267093799 481 07:19:57.847 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 482 07:21:05.945 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093799 483 07:21:05.945 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 484 07:21:06.005 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 485 07:21:06.005 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 486 07:21:06.005 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093800, seq# expected = 2267093800 487 07:29:58.721 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 488 07:34:59.153 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 489 07:39:59.585 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 490 07:42:18.274 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093800 491 07:42:18.274 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 492 07:42:18.314 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 493 07:42:18.314 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 494 07:42:18.314 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093801, seq# expected = 2267093801 495 07:44:59.506 08/21/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 137.69.115.16, src port 1359, dst port 4005 496 07:45:09.020 08/21/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 137.69.115.16, seq# = 2267093801 497 07:45:09.020 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 137.69.115.16 498 07:45:09.060 08/21/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 499 07:45:09.060 08/21/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 137.69.115.16 500 07:45:09.060 08/21/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 137.69.115.16, seq# received = 2267093802, seq# expected = 2267093802 501 07:47:07.480 08/21/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 502 07:47:07.480 08/21/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 503 07:47:07.480 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 137.69.115.16 504 07:47:07.480 08/21/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 2DE611EC INBOUND SPI = 1777F2F5) 505 07:47:07.480 08/21/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=5709CE8E 506 07:47:07.480 08/21/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=47E8FB796F5C9CD7 R_Cookie=3C8B673D7540A043) reason = DEL_REASON_RESET_SADB 507 07:47:07.480 08/21/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 508 07:47:07.480 08/21/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=47E8FB796F5C9CD7 R_Cookie=3C8B673D7540A043) reason = DEL_REASON_RESET_SADB 509 07:47:07.480 08/21/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 510 07:47:07.480 08/21/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 511 07:47:07.480 08/21/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 512 07:47:07.480 08/21/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1359 for TCP connection. 513 07:47:07.480 08/21/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 137.69.115.16 disconnected: duration: 0 days 8:22:33 514 07:47:07.490 08/21/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 515 07:47:09.022 08/21/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 516 07:47:09.022 08/21/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 517 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xf5f27717 518 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xf5f27717 519 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xec11e62d 520 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xec11e62d 521 07:47:09.032 08/21/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1359, dst port 4005 522 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 523 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 524 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 525 07:47:09.032 08/21/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys