EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 07:42:50.287 08/26/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 07:42:50.317 08/26/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 07:42:50.317 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 4 07:42:50.437 08/26/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1081 for TCP connection. 5 07:42:50.437 08/26/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 07:42:50.447 08/26/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 07:42:50.447 08/26/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.15, src port 1081, dst port 4005 8 07:42:51.409 08/26/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.15, src port 4005, dst port 1081 9 07:42:51.409 08/26/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.15, src port 1081, dst port 4005 10 07:42:51.409 08/26/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw3.emc.com" 11 07:42:51.909 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw3.emc.com" 12 07:42:51.929 08/26/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.15. 13 07:42:51.949 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.15 14 07:42:52.140 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 15 07:42:52.140 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.15 16 07:42:52.140 08/26/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 07:42:52.140 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 07:42:52.140 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 07:42:52.140 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 07:42:52.180 08/26/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 07:42:52.190 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.15 22 07:42:52.190 08/26/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 07:42:52.190 08/26/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 07:42:52.240 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.15 25 07:42:52.240 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 137.69.115.15 26 07:42:52.240 08/26/07 Sev=Info/4 CM/0x6310001B Received alternative server address "137.69.115.16" from primary server 27 07:42:52.240 08/26/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=9011F18B358B3CA1 R_Cookie=6BF557C68F536FDF) reason = DEL_REASON_LOAD_BALANCING 28 07:42:52.240 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.15 29 07:42:52.911 08/26/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=9011F18B358B3CA1 R_Cookie=6BF557C68F536FDF) reason = DEL_REASON_LOAD_BALANCING 30 07:42:52.911 08/26/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw3.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 07:42:52.911 08/26/07 Sev=Info/4 CM/0x63100010 Try alternative server "137.69.115.16" given by the primary server 32 07:42:52.911 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 33 07:42:52.931 08/26/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 07:42:53.411 08/26/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.15, src port 1081, dst port 4005 35 07:42:53.411 08/26/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 137.69.115.16, src port 1081, dst port 4005 36 07:42:53.411 08/26/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 137.69.115.16, src port 4005, dst port 1081 37 07:42:53.411 08/26/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 137.69.115.16, src port 1081, dst port 4005 38 07:42:53.411 08/26/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "137.69.115.16" 39 07:42:53.912 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "137.69.115.16" 40 07:42:53.922 08/26/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 137.69.115.16. 41 07:42:53.942 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 137.69.115.16 42 07:42:54.133 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 43 07:42:54.133 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 137.69.115.16 44 07:42:54.133 08/26/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 07:42:54.133 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 07:42:54.133 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 07:42:54.133 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 07:42:54.153 08/26/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 07:42:54.153 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 137.69.115.16 50 07:42:54.153 08/26/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 07:42:54.153 08/26/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 07:42:54.203 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 137.69.115.16 53 07:42:54.203 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 137.69.115.16 54 07:42:54.203 08/26/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 07:42:56.626 08/26/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 07:42:56.626 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 137.69.115.16 57 07:42:56.626 08/26/07 Sev=Info/4 CM/0x63100018 User does not provide any authentication data 58 07:42:56.626 08/26/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 59 07:42:56.626 08/26/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=CB9DDCB06A3BCF4D R_Cookie=8C6835C215E4D8A3) reason = DEL_REASON_RESET_SADB 60 07:42:56.626 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 137.69.115.16 61 07:42:56.626 08/26/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=CB9DDCB06A3BCF4D R_Cookie=8C6835C215E4D8A3) reason = DEL_REASON_RESET_SADB 62 07:42:56.636 08/26/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 63 07:42:56.636 08/26/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 64 07:42:56.666 08/26/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1081 for TCP connection. 65 07:42:56.917 08/26/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 66 07:42:56.917 08/26/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 137.69.115.16, src port 1081, dst port 4005 67 07:42:56.917 08/26/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 68 07:42:56.917 08/26/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 69 07:42:56.917 08/26/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 70 07:43:07.992 08/26/07 Sev=Info/4 CM/0x63100002 Begin connection process 71 07:43:08.012 08/26/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 72 07:43:08.012 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 73 07:43:08.133 08/26/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1090 for TCP connection. 74 07:43:08.433 08/26/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 75 07:43:08.433 08/26/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 76 07:43:08.433 08/26/07 Sev=Info/6 IPSEC/0x6370002B Sent 7 packets, 0 were fragmented. 77 07:43:08.433 08/26/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1090, dst port 4005 78 07:43:08.433 08/26/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1090 79 07:43:08.433 08/26/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1090, dst port 4005 80 07:43:08.433 08/26/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 81 07:43:08.944 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 82 07:43:08.964 08/26/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 83 07:43:08.984 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 84 07:43:09.234 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 85 07:43:09.234 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 86 07:43:09.234 08/26/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 87 07:43:09.234 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 88 07:43:09.234 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 89 07:43:09.234 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 90 07:43:09.244 08/26/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 91 07:43:09.244 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 92 07:43:09.244 08/26/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 93 07:43:09.244 08/26/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 94 07:43:09.344 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 95 07:43:09.344 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 96 07:43:09.344 08/26/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.17" from primary server 97 07:43:09.344 08/26/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=CC9BADF7A40033B6 R_Cookie=470709C9EA2A0FF3) reason = DEL_REASON_LOAD_BALANCING 98 07:43:09.344 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 99 07:43:09.935 08/26/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=CC9BADF7A40033B6 R_Cookie=470709C9EA2A0FF3) reason = DEL_REASON_LOAD_BALANCING 100 07:43:09.935 08/26/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 101 07:43:09.935 08/26/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.17" given by the primary server 102 07:43:09.935 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.17" 103 07:43:09.955 08/26/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 104 07:43:10.436 08/26/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1090, dst port 4005 105 07:43:10.436 08/26/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.17, src port 1090, dst port 4005 106 07:43:10.436 08/26/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.17, src port 4005, dst port 1090 107 07:43:10.436 08/26/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.17, src port 1090, dst port 4005 108 07:43:10.436 08/26/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.17" 109 07:43:10.937 08/26/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.17" 110 07:43:10.957 08/26/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.17. 111 07:43:10.977 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.17 112 07:43:11.227 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 113 07:43:11.227 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.17 114 07:43:11.227 08/26/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 115 07:43:11.227 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 116 07:43:11.227 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 117 07:43:11.227 08/26/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 118 07:43:11.247 08/26/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 119 07:43:11.247 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.17 120 07:43:11.247 08/26/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 121 07:43:11.247 08/26/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 122 07:43:11.357 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 123 07:43:11.357 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 124 07:43:11.357 08/26/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 125 07:43:19.639 08/26/07 Sev=Info/4 CM/0x63100017 xAuth application returned 126 07:43:19.639 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 127 07:43:22.183 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 128 07:43:22.183 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 129 07:43:22.183 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 130 07:43:22.183 08/26/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 131 07:43:22.283 08/26/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 132 07:43:22.283 08/26/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 133 07:43:22.283 08/26/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 134 07:43:22.283 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.17 135 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 136 07:43:23.214 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.17 137 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.17.127 138 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 139 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 140 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 141 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 142 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 143 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = *********************** EMC Americas East Coast VPN Gateway *********************** This is a restricted area. Unauthorized Access Prohibited. Access only authorized for EMC Approved Personnel. If you are not authorized by EMC, PLEASE DISCONNECT NOW. 144 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 145 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 146 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 147 07:43:23.214 08/26/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.Rel built by vmurphy on Jul 20 2005 10:12:45 148 07:43:23.214 08/26/07 Sev=Info/4 CM/0x63100019 Mode Config data received 149 07:43:23.224 08/26/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.17.127, GW IP = 128.221.195.17, Remote IP = 0.0.0.0 150 07:43:23.234 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.17 151 07:43:23.234 08/26/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 152 07:43:23.234 08/26/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 153 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 154 07:43:23.355 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.17 155 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 156 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 13 seconds, setting expiry to 86387 seconds from now 157 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 158 07:43:23.355 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.17 159 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 160 07:43:23.355 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.17 161 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=4CDD711D OUTBOUND SPI = 0x4EF92504 INBOUND SPI = 0x55079380) 162 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x4EF92504 163 07:43:23.355 08/26/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x55079380 164 07:43:26.469 08/26/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.17.127/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 165 07:43:26.529 08/26/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 166 07:43:26.559 08/26/07 Sev=Info/4 CM/0x6310001A One secure connection established 167 07:43:26.739 08/26/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.4.17.127, 192.168.186.1, 192.168.121.1. 168 07:43:26.739 08/26/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.17.127. Current address(es): 192.168.1.102, 10.4.17.127, 192.168.186.1, 192.168.121.1. 169 07:43:26.830 08/26/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 170 07:43:26.830 08/26/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x0425f94e into key list 171 07:43:26.830 08/26/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 172 07:43:26.830 08/26/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x80930755 into key list 173 07:43:26.830 08/26/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.17.127 174 07:43:27.961 08/26/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x0425f94e for inbound key with SPI=0x80930755 175 07:46:21.277 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297918 176 07:46:21.277 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 177 07:46:21.407 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 178 07:46:21.407 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 179 07:46:21.407 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297919, seq# expected = 3992297919 180 07:47:21.480 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297919 181 07:47:21.480 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 182 07:47:21.589 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 183 07:47:21.589 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 184 07:47:21.589 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297920, seq# expected = 3992297920 185 07:48:11.731 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 186 07:50:33.750 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297920 187 07:50:33.750 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 188 07:50:33.880 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 189 07:50:33.880 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 190 07:50:33.880 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297921, seq# expected = 3992297921 191 07:50:44.275 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297921 192 07:50:44.275 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 193 07:50:44.385 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 194 07:50:44.385 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 195 07:50:44.385 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297922, seq# expected = 3992297922 196 07:50:59.787 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297922 197 07:50:59.787 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 198 07:50:59.897 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 199 07:50:59.897 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 200 07:50:59.897 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297923, seq# expected = 3992297923 201 07:53:11.475 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 202 07:58:11.937 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 203 08:00:09.606 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297923 204 08:00:09.606 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 205 08:00:09.726 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 206 08:00:09.726 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 207 08:00:09.726 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297924, seq# expected = 3992297924 208 08:00:20.121 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297924 209 08:00:20.121 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 210 08:00:20.231 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 211 08:00:20.231 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 212 08:00:20.231 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297925, seq# expected = 3992297925 213 08:03:12.891 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 214 08:05:24.545 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297925 215 08:05:24.545 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 216 08:05:24.655 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 217 08:05:24.655 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 218 08:05:24.655 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297926, seq# expected = 3992297926 219 08:06:00.097 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297926 220 08:06:00.097 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 221 08:06:00.207 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 222 08:06:00.207 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 223 08:06:00.207 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297927, seq# expected = 3992297927 224 08:08:13.265 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 225 08:12:25.112 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297927 226 08:12:25.112 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 227 08:12:25.212 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 228 08:12:25.212 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 229 08:12:25.212 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297928, seq# expected = 3992297928 230 08:13:13.162 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 231 08:15:18.320 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297928 232 08:15:18.320 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 233 08:15:18.450 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 234 08:15:18.450 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 235 08:15:18.450 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297929, seq# expected = 3992297929 236 08:15:58.871 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297929 237 08:15:58.871 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 238 08:15:58.981 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 239 08:15:58.981 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 240 08:15:58.981 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297930, seq# expected = 3992297930 241 08:18:14.062 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 242 08:20:09.829 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297930 243 08:20:09.829 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 244 08:20:09.929 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 245 08:20:09.929 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 246 08:20:09.929 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297931, seq# expected = 3992297931 247 08:23:14.250 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 248 08:25:23.955 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297931 249 08:25:23.955 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 250 08:25:28.963 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297932 251 08:25:28.963 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 252 08:25:29.124 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 253 08:25:29.124 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 254 08:25:29.124 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297933, seq# expected = 3992297933 255 08:28:14.256 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 256 08:28:20.265 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297933 257 08:28:20.265 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 258 08:28:20.376 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 259 08:28:20.376 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 260 08:28:20.376 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297934, seq# expected = 3992297934 261 08:30:12.944 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297934 262 08:30:12.944 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 263 08:30:13.054 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 264 08:30:13.054 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 265 08:30:13.054 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297935, seq# expected = 3992297935 266 08:30:28.469 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297935 267 08:30:28.469 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 268 08:30:28.579 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 269 08:30:28.579 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 270 08:30:28.579 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297936, seq# expected = 3992297936 271 08:33:14.753 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 272 08:38:15.086 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 273 08:40:13.697 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297936 274 08:40:13.697 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 275 08:40:13.828 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 276 08:40:13.828 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 277 08:40:13.828 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297937, seq# expected = 3992297937 278 08:40:24.213 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297937 279 08:40:24.213 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 280 08:40:29.220 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297938 281 08:40:29.220 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 282 08:40:29.320 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 283 08:40:29.330 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 284 08:40:29.330 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297939, seq# expected = 3992297939 285 08:43:15.462 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 286 08:44:26.065 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297939 287 08:44:26.065 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 288 08:44:31.073 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297940 289 08:44:31.073 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 290 08:44:31.173 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 291 08:44:31.183 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 292 08:44:31.183 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297941, seq# expected = 3992297941 293 08:46:01.705 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297941 294 08:46:01.705 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 295 08:46:01.815 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 296 08:46:01.815 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 297 08:46:01.815 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297942, seq# expected = 3992297942 298 08:48:15.900 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 299 08:48:59.965 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297942 300 08:48:59.965 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 301 08:49:00.075 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 302 08:49:00.075 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 303 08:49:00.075 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297943, seq# expected = 3992297943 304 08:50:10.578 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297943 305 08:50:10.578 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 306 08:50:10.698 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 307 08:50:10.698 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 308 08:50:10.698 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297944, seq# expected = 3992297944 309 08:50:21.093 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297944 310 08:50:21.093 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 311 08:50:21.203 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 312 08:50:21.203 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 313 08:50:21.203 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297945, seq# expected = 3992297945 314 08:53:15.847 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 315 08:55:28.539 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297945 316 08:55:28.539 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 317 08:55:28.649 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 318 08:55:28.649 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 319 08:55:28.649 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297946, seq# expected = 3992297946 320 08:58:16.293 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 321 09:00:13.454 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297946 322 09:00:13.454 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 323 09:00:13.564 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 324 09:00:13.564 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 325 09:00:13.564 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297947, seq# expected = 3992297947 326 09:00:23.969 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297947 327 09:00:23.969 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 328 09:00:24.089 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 329 09:00:24.089 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 330 09:00:24.089 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297948, seq# expected = 3992297948 331 09:00:59.521 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297948 332 09:00:59.521 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 333 09:00:59.631 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 334 09:00:59.631 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 335 09:00:59.631 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297949, seq# expected = 3992297949 336 09:03:16.721 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 337 09:07:12.064 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297949 338 09:07:12.064 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 339 09:07:12.174 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 340 09:07:12.174 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 341 09:07:12.174 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297950, seq# expected = 3992297950 342 09:08:17.159 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 343 09:10:19.830 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297950 344 09:10:19.830 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 345 09:10:24.847 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297951 346 09:10:24.847 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 347 09:10:24.967 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 348 09:10:24.967 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 349 09:10:24.967 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297952, seq# expected = 3992297952 350 09:13:18.082 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 351 09:15:21.256 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297952 352 09:15:21.256 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 353 09:15:21.367 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 354 09:15:21.367 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 355 09:15:21.367 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297953, seq# expected = 3992297953 356 09:16:01.815 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297953 357 09:16:01.815 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 358 09:16:01.935 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 359 09:16:01.935 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 360 09:16:01.935 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297954, seq# expected = 3992297954 361 09:18:18.513 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 362 09:20:19.688 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297954 363 09:20:19.688 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 364 09:20:19.809 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 365 09:20:19.809 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 366 09:20:19.809 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297955, seq# expected = 3992297955 367 09:20:30.204 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297955 368 09:20:30.204 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 369 09:20:30.314 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 370 09:20:30.314 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 371 09:20:30.314 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297956, seq# expected = 3992297956 372 09:21:20.777 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297956 373 09:21:20.777 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 374 09:21:20.887 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 375 09:21:20.887 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 376 09:21:20.887 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297957, seq# expected = 3992297957 377 09:23:18.447 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 378 09:25:17.620 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297957 379 09:25:17.620 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 380 09:25:17.740 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 381 09:25:17.740 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 382 09:25:17.740 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297958, seq# expected = 3992297958 383 09:28:19.181 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 384 09:30:11.343 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297958 385 09:30:11.343 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 386 09:30:16.350 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297959 387 09:30:16.350 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 388 09:30:16.460 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 389 09:30:16.460 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 390 09:30:16.460 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297960, seq# expected = 3992297960 391 09:31:02.416 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297960 392 09:31:02.416 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 393 09:31:02.526 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 394 09:31:02.526 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 395 09:31:02.526 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297961, seq# expected = 3992297961 396 09:33:19.124 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 397 09:35:28.802 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297961 398 09:35:28.802 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 399 09:35:28.912 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 400 09:35:28.912 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 401 09:35:28.912 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297962, seq# expected = 3992297962 402 09:38:19.569 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 403 09:43:20.495 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 404 09:46:01.234 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297962 405 09:46:01.234 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 406 09:46:01.344 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 407 09:46:01.344 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 408 09:46:01.344 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297963, seq# expected = 3992297963 409 09:48:20.934 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 410 09:50:17.102 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297963 411 09:50:17.102 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 412 09:50:17.212 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 413 09:50:17.212 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 414 09:50:17.212 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297964, seq# expected = 3992297964 415 09:50:27.617 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297964 416 09:50:27.617 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 417 09:50:27.727 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 418 09:50:27.727 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 419 09:50:27.727 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297965, seq# expected = 3992297965 420 09:53:21.369 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 421 09:55:21.072 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297965 422 09:55:21.072 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 423 09:55:21.182 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 424 09:55:21.182 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 425 09:55:21.182 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297966, seq# expected = 3992297966 426 09:57:22.558 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297966 427 09:57:22.558 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 428 09:57:22.668 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 429 09:57:22.668 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 430 09:57:22.668 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297967, seq# expected = 3992297967 431 09:57:58.109 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297967 432 09:57:58.109 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 433 09:57:58.210 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 434 09:57:58.220 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 435 09:57:58.220 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297968, seq# expected = 3992297968 436 09:58:14.143 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297968 437 09:58:14.143 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 438 09:58:14.243 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 439 09:58:14.243 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 440 09:58:14.243 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297969, seq# expected = 3992297969 441 09:58:21.153 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 442 10:00:25.322 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297969 443 10:00:25.322 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 444 10:00:25.432 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 445 10:00:25.432 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 446 10:00:25.432 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297970, seq# expected = 3992297970 447 10:01:00.872 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297970 448 10:01:00.872 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 449 10:01:01.003 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 450 10:01:01.003 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 451 10:01:01.003 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297971, seq# expected = 3992297971 452 10:01:11.387 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297971 453 10:01:11.387 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 454 10:01:11.497 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 455 10:01:11.497 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 456 10:01:11.497 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297972, seq# expected = 3992297972 457 10:03:22.093 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 458 10:03:25.097 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297972 459 10:03:25.097 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 460 10:03:25.217 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 461 10:03:25.217 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 462 10:03:25.217 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297973, seq# expected = 3992297973 463 10:03:35.612 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297973 464 10:03:35.612 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 465 10:03:35.712 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 466 10:03:35.712 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 467 10:03:35.712 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297974, seq# expected = 3992297974 468 10:04:01.148 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297974 469 10:04:01.148 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 470 10:04:01.258 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 471 10:04:01.258 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 472 10:04:01.258 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297975, seq# expected = 3992297975 473 10:05:22.264 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297975 474 10:05:22.264 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 475 10:05:22.384 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 476 10:05:22.384 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 477 10:05:22.384 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297976, seq# expected = 3992297976 478 10:08:22.525 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 479 10:08:23.526 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297976 480 10:08:23.526 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 481 10:08:23.636 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 482 10:08:23.636 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 483 10:08:23.636 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297977, seq# expected = 3992297977 484 10:08:34.041 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297977 485 10:08:34.041 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 486 10:08:34.151 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 487 10:08:34.151 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 488 10:08:34.151 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297978, seq# expected = 3992297978 489 10:10:16.189 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297978 490 10:10:16.189 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 491 10:10:16.319 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 492 10:10:16.319 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 493 10:10:16.319 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297979, seq# expected = 3992297979 494 10:10:31.722 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297979 495 10:10:31.722 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 496 10:10:31.832 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 497 10:10:31.832 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 498 10:10:31.832 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297980, seq# expected = 3992297980 499 10:11:43.816 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297980 500 10:11:43.816 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 501 10:11:43.926 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 502 10:11:43.926 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 503 10:11:43.926 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297981, seq# expected = 3992297981 504 10:13:22.459 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 505 10:15:26.138 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297981 506 10:15:26.138 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 507 10:15:26.298 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 508 10:15:26.298 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 509 10:15:26.298 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297982, seq# expected = 3992297982 510 10:16:01.689 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297982 511 10:16:01.689 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 512 10:16:01.800 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 513 10:16:01.800 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 514 10:16:01.800 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297983, seq# expected = 3992297983 515 10:18:23.385 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 516 10:20:12.535 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297983 517 10:20:12.535 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 518 10:20:12.645 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 519 10:20:12.645 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 520 10:20:12.645 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297984, seq# expected = 3992297984 521 10:20:23.049 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297984 522 10:20:23.049 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 523 10:20:23.159 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 524 10:20:23.159 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 525 10:20:23.159 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297985, seq# expected = 3992297985 526 10:20:43.575 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297985 527 10:20:43.575 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 528 10:20:43.675 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 529 10:20:43.675 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 530 10:20:43.675 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297986, seq# expected = 3992297986 531 10:23:24.290 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 532 10:23:44.318 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297986 533 10:23:44.318 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 534 10:23:44.428 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 535 10:23:44.428 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 536 10:23:44.428 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297987, seq# expected = 3992297987 537 10:28:24.212 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 538 10:30:13.917 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297987 539 10:30:13.917 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 540 10:30:14.027 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 541 10:30:14.027 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 542 10:30:14.027 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297988, seq# expected = 3992297988 543 10:30:24.431 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297988 544 10:30:24.431 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 545 10:30:29.438 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297989 546 10:30:29.438 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 547 10:30:29.549 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 548 10:30:29.549 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 549 10:30:29.549 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297990, seq# expected = 3992297990 550 10:31:00.482 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297990 551 10:31:00.482 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 552 10:31:00.592 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 553 10:31:00.592 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 554 10:31:00.592 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297991, seq# expected = 3992297991 555 10:33:24.685 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 556 10:35:08.364 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297991 557 10:35:08.364 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 558 10:35:08.474 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 559 10:35:08.474 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 560 10:35:08.474 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297992, seq# expected = 3992297992 561 10:35:23.879 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297992 562 10:35:23.879 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 563 10:35:23.989 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 564 10:35:23.989 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 565 10:35:23.989 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297993, seq# expected = 3992297993 566 10:35:39.404 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297993 567 10:35:39.404 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 568 10:35:39.505 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 569 10:35:39.505 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 570 10:35:39.505 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297994, seq# expected = 3992297994 571 10:38:25.675 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 572 10:38:46.709 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297994 573 10:38:46.709 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 574 10:38:52.218 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297995 575 10:38:52.218 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 576 10:38:52.328 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 577 10:38:52.328 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 578 10:38:52.328 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297996, seq# expected = 3992297996 579 10:40:07.852 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297996 580 10:40:07.852 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 581 10:40:07.972 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 582 10:40:07.972 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 583 10:40:07.972 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297997, seq# expected = 3992297997 584 10:40:23.374 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297997 585 10:40:23.374 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 586 10:40:23.484 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 587 10:40:23.484 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 588 10:40:23.484 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297998, seq# expected = 3992297998 589 10:43:25.650 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 590 10:45:31.333 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297998 591 10:45:31.333 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 592 10:45:31.453 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 593 10:45:31.453 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 594 10:45:31.453 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992297999, seq# expected = 3992297999 595 10:45:41.849 08/26/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.17, seq# = 3992297999 596 10:45:41.849 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.17 597 10:45:41.949 08/26/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.17 598 10:45:41.949 08/26/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.17 599 10:45:41.949 08/26/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.17, seq# received = 3992298000, seq# expected = 3992298000 600 10:48:25.657 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 601 10:53:26.646 08/26/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.17, src port 1090, dst port 4005 602 10:54:33.804 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 128.221.195.17 603 10:54:33.814 08/26/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 4EF92504 INBOUND SPI = 55079380) 604 10:54:33.814 08/26/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=4CDD711D 605 10:54:33.814 08/26/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=DA472997E7B906AF R_Cookie=68DAB3AB4B05AA0F) reason = DEL_REASON_RESET_SADB 606 10:54:33.814 08/26/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.17 607 10:54:33.814 08/26/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=DA472997E7B906AF R_Cookie=68DAB3AB4B05AA0F) reason = DEL_REASON_RESET_SADB 608 10:54:33.814 08/26/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 609 10:54:33.814 08/26/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 610 10:54:33.814 08/26/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 611 10:54:33.814 08/26/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1090 for TCP connection. 612 10:54:33.814 08/26/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 128.221.195.17 disconnected: duration: 0 days 3:11:7 613 10:54:33.814 08/26/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 614 10:54:33.834 08/26/07 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 615 10:54:33.844 08/26/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 616 10:54:35.646 08/26/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled