EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 22:39:07.512 08/29/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 22:39:07.552 08/29/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 22:39:07.552 08/29/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 4 22:39:07.602 08/29/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1088 for TCP connection. 5 22:39:07.753 08/29/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 22:39:07.753 08/29/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 22:39:07.753 08/29/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1088, dst port 4005 8 22:39:08.253 08/29/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1088 9 22:39:08.253 08/29/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1088, dst port 4005 10 22:39:08.253 08/29/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 11 22:39:08.754 08/29/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 12 22:39:08.774 08/29/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 13 22:39:08.804 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 14 22:39:09.065 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 15 22:39:09.065 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 16 22:39:09.065 08/29/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 22:39:09.065 08/29/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 22:39:09.065 08/29/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 22:39:09.065 08/29/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 22:39:09.085 08/29/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 22:39:09.085 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 22 22:39:09.095 08/29/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 22:39:09.095 08/29/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 22:39:09.205 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 25 22:39:09.205 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 26 22:39:09.205 08/29/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 27 22:39:09.205 08/29/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=1263CC98237E4B7B R_Cookie=DC8FC17F2F696B39) reason = DEL_REASON_LOAD_BALANCING 28 22:39:09.205 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 29 22:39:09.756 08/29/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=1263CC98237E4B7B R_Cookie=DC8FC17F2F696B39) reason = DEL_REASON_LOAD_BALANCING 30 22:39:09.756 08/29/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 31 22:39:09.756 08/29/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 32 22:39:09.756 08/29/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 33 22:39:09.766 08/29/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 34 22:39:10.256 08/29/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1088, dst port 4005 35 22:39:10.256 08/29/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 1088, dst port 4005 36 22:39:10.256 08/29/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.16, src port 4005, dst port 1088 37 22:39:10.256 08/29/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.16, src port 1088, dst port 4005 38 22:39:10.256 08/29/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.16" 39 22:39:10.757 08/29/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 40 22:39:10.777 08/29/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.16. 41 22:39:10.797 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.16 42 22:39:11.047 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 43 22:39:11.047 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.16 44 22:39:11.047 08/29/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 45 22:39:11.047 08/29/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 46 22:39:11.047 08/29/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 47 22:39:11.057 08/29/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 48 22:39:11.077 08/29/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 49 22:39:11.077 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.16 50 22:39:11.077 08/29/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 51 22:39:11.077 08/29/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 52 22:39:11.188 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 53 22:39:11.188 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 54 22:39:11.188 08/29/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 55 22:39:21.062 08/29/07 Sev=Info/4 CM/0x63100017 xAuth application returned 56 22:39:21.062 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 57 22:39:23.375 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 58 22:39:23.375 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 59 22:39:23.375 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 60 22:39:23.375 08/29/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 61 22:39:23.465 08/29/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 62 22:39:23.465 08/29/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 63 22:39:23.465 08/29/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 64 22:39:23.475 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 65 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 66 22:39:24.427 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 67 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.8.248 68 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 69 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 70 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 71 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 72 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 73 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas East Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 74 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 75 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 76 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 77 22:39:24.427 08/29/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 78 22:39:24.427 08/29/07 Sev=Info/4 CM/0x63100019 Mode Config data received 79 22:39:24.437 08/29/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.8.248, GW IP = 128.221.195.16, Remote IP = 0.0.0.0 80 22:39:24.447 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.16 81 22:39:24.447 08/29/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 82 22:39:24.447 08/29/07 Sev=Info/6 IPSEC/0x6370002B Sent 8 packets, 0 were fragmented. 83 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 84 22:39:24.567 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 85 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 86 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 14 seconds, setting expiry to 86386 seconds from now 87 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 88 22:39:24.567 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 89 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 90 22:39:24.567 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.16 91 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=9C2C2D68 OUTBOUND SPI = 0x68D5E820 INBOUND SPI = 0x99FF457B) 92 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x68D5E820 93 22:39:24.567 08/29/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x99FF457B 94 22:39:27.481 08/29/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.8.248/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 95 22:39:27.561 08/29/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 96 22:39:27.621 08/29/07 Sev=Info/4 CM/0x6310001A One secure connection established 97 22:39:27.751 08/29/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.4.8.248, 192.168.186.1, 192.168.121.1. 98 22:39:27.751 08/29/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.8.248. Current address(es): 192.168.1.102, 10.4.8.248, 192.168.186.1, 192.168.121.1. 99 22:39:27.852 08/29/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 100 22:39:27.852 08/29/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x20e8d568 into key list 101 22:39:27.852 08/29/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 102 22:39:27.852 08/29/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x7b45ff99 into key list 103 22:39:27.852 08/29/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.8.248 104 22:39:28.783 08/29/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x20e8d568 for inbound key with SPI=0x7b45ff99 105 22:42:05.508 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095226 106 22:42:05.508 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 107 22:42:10.516 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095227 108 22:42:10.516 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 109 22:42:10.626 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 110 22:42:10.626 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 111 22:42:10.626 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095228, seq# expected = 3367095228 112 22:44:11.690 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 113 22:45:24.795 08/29/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 114 22:49:12.122 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 115 22:59:12.699 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 116 23:03:40.791 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095228 117 23:03:40.791 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 118 23:03:40.931 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 119 23:03:40.931 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 120 23:03:40.931 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095229, seq# expected = 3367095229 121 23:04:06.328 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095229 122 23:04:06.328 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 123 23:04:06.438 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 124 23:04:06.438 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 125 23:04:06.438 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095230, seq# expected = 3367095230 126 23:04:12.337 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 127 23:05:11.933 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095230 128 23:05:11.933 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 129 23:05:12.043 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 130 23:05:12.043 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 131 23:05:12.043 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095231, seq# expected = 3367095231 132 23:05:32.463 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095231 133 23:05:32.463 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 134 23:05:32.573 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 135 23:05:32.573 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 136 23:05:32.573 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095232, seq# expected = 3367095232 137 23:05:57.999 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095232 138 23:05:57.999 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 139 23:05:58.109 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 140 23:05:58.109 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 141 23:05:58.109 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095233, seq# expected = 3367095233 142 23:06:13.522 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095233 143 23:06:13.522 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 144 23:06:13.652 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 145 23:06:13.652 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 146 23:06:13.652 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095234, seq# expected = 3367095234 147 23:06:29.044 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095234 148 23:06:29.044 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 149 23:06:29.154 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 150 23:06:29.154 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 151 23:06:29.154 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095235, seq# expected = 3367095235 152 23:06:39.559 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095235 153 23:06:39.559 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 154 23:06:39.669 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 155 23:06:39.669 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 156 23:06:39.669 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095236, seq# expected = 3367095236 157 23:07:50.161 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095236 158 23:07:50.161 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 159 23:07:50.281 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 160 23:07:50.281 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 161 23:07:50.281 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095237, seq# expected = 3367095237 162 23:08:00.676 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095237 163 23:08:00.676 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 164 23:08:00.796 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 165 23:08:00.806 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 166 23:08:00.806 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095238, seq# expected = 3367095238 167 23:08:11.191 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095238 168 23:08:11.191 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 169 23:08:11.301 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 170 23:08:11.301 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 171 23:08:11.301 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095239, seq# expected = 3367095239 172 23:08:31.720 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095239 173 23:08:31.720 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 174 23:08:31.831 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 175 23:08:31.831 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 176 23:08:31.831 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095240, seq# expected = 3367095240 177 23:08:42.235 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095240 178 23:08:42.235 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 179 23:08:42.366 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 180 23:08:42.366 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 181 23:08:42.366 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095241, seq# expected = 3367095241 182 23:09:02.765 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095241 183 23:09:02.765 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 184 23:09:02.885 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 185 23:09:02.885 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 186 23:09:02.885 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095242, seq# expected = 3367095242 187 23:09:12.779 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 188 23:09:13.290 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095242 189 23:09:13.290 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 190 23:09:13.400 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 191 23:09:13.400 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 192 23:09:13.400 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095243, seq# expected = 3367095243 193 23:09:28.802 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095243 194 23:09:28.802 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 195 23:09:28.923 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 196 23:09:28.923 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 197 23:09:28.923 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095244, seq# expected = 3367095244 198 23:11:04.440 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095244 199 23:11:04.440 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 200 23:11:04.550 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 201 23:11:04.550 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 202 23:11:04.550 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095245, seq# expected = 3367095245 203 23:11:39.991 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095245 204 23:11:39.991 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 205 23:11:40.111 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 206 23:11:40.111 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 207 23:11:40.111 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095246, seq# expected = 3367095246 208 23:11:50.506 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095246 209 23:11:50.506 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 210 23:11:50.616 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 211 23:11:50.616 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 212 23:11:50.616 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095247, seq# expected = 3367095247 213 23:13:02.109 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095247 214 23:13:02.109 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 215 23:13:02.219 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 216 23:13:02.219 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 217 23:13:02.219 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095248, seq# expected = 3367095248 218 23:13:12.624 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095248 219 23:13:12.624 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 220 23:13:12.744 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 221 23:13:12.744 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 222 23:13:12.744 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095249, seq# expected = 3367095249 223 23:13:38.161 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095249 224 23:13:38.161 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 225 23:13:43.168 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095250 226 23:13:43.168 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 227 23:13:43.278 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 228 23:13:43.278 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 229 23:13:43.278 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095251, seq# expected = 3367095251 230 23:13:58.691 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095251 231 23:13:58.691 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 232 23:13:58.801 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 233 23:13:58.801 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 234 23:13:58.801 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095252, seq# expected = 3367095252 235 23:14:09.206 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095252 236 23:14:09.206 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 237 23:14:09.316 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 238 23:14:09.316 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 239 23:14:09.316 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095253, seq# expected = 3367095253 240 23:14:13.211 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 241 23:14:39.750 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095253 242 23:14:39.750 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 243 23:14:39.860 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 244 23:14:39.860 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 245 23:14:39.860 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095254, seq# expected = 3367095254 246 23:15:00.279 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095254 247 23:15:00.279 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 248 23:15:00.399 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 249 23:15:00.399 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 250 23:15:00.399 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095255, seq# expected = 3367095255 251 23:15:10.794 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095255 252 23:15:10.794 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 253 23:15:10.914 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 254 23:15:10.914 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 255 23:15:10.914 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095256, seq# expected = 3367095256 256 23:15:41.338 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095256 257 23:15:41.338 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 258 23:15:41.458 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 259 23:15:41.458 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 260 23:15:41.458 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095257, seq# expected = 3367095257 261 23:16:01.868 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095257 262 23:16:01.868 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 263 23:16:01.978 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 264 23:16:01.978 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 265 23:16:01.978 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095258, seq# expected = 3367095258 266 23:16:32.912 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095258 267 23:16:32.912 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 268 23:16:33.032 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 269 23:16:33.032 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 270 23:16:33.032 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095259, seq# expected = 3367095259 271 23:17:28.492 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095259 272 23:17:28.492 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 273 23:17:28.602 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 274 23:17:28.602 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 275 23:17:28.602 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095260, seq# expected = 3367095260 276 23:17:39.007 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095260 277 23:17:39.007 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 278 23:17:39.127 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 279 23:17:39.127 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 280 23:17:39.127 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095261, seq# expected = 3367095261 281 23:17:49.522 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095261 282 23:17:49.522 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 283 23:17:49.643 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 284 23:17:49.643 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 285 23:17:49.643 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095262, seq# expected = 3367095262 286 23:18:10.052 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095262 287 23:18:10.052 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 288 23:18:10.162 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 289 23:18:10.162 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 290 23:18:10.162 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095263, seq# expected = 3367095263 291 23:18:30.581 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095263 292 23:18:30.581 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 293 23:18:30.712 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 294 23:18:30.712 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 295 23:18:30.712 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095264, seq# expected = 3367095264 296 23:18:41.097 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095264 297 23:18:41.097 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 298 23:18:41.217 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 299 23:18:41.217 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 300 23:18:41.217 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095265, seq# expected = 3367095265 301 23:19:01.636 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095265 302 23:19:01.636 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 303 23:19:01.756 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 304 23:19:01.756 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 305 23:19:01.756 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095266, seq# expected = 3367095266 306 23:19:13.653 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 307 23:19:32.180 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095266 308 23:19:32.180 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 309 23:19:32.290 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 310 23:19:32.290 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 311 23:19:32.290 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095267, seq# expected = 3367095267 312 23:19:43.206 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095267 313 23:19:43.206 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 314 23:19:43.316 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 315 23:19:43.316 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 316 23:19:43.316 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095268, seq# expected = 3367095268 317 23:19:53.721 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095268 318 23:19:53.721 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 319 23:19:53.841 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 320 23:19:53.841 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 321 23:19:53.841 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095269, seq# expected = 3367095269 322 23:20:04.236 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095269 323 23:20:04.236 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 324 23:20:04.356 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 325 23:20:04.356 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 326 23:20:04.356 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095270, seq# expected = 3367095270 327 23:20:14.751 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095270 328 23:20:14.751 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 329 23:20:14.861 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 330 23:20:14.871 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 331 23:20:14.871 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095271, seq# expected = 3367095271 332 23:20:30.284 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095271 333 23:20:30.284 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 334 23:20:35.781 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095272 335 23:20:35.781 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 336 23:20:35.892 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 337 23:20:35.892 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 338 23:20:35.892 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095273, seq# expected = 3367095273 339 23:21:01.318 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095273 340 23:21:01.318 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 341 23:21:01.438 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 342 23:21:01.438 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 343 23:21:01.438 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095274, seq# expected = 3367095274 344 23:21:16.841 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095274 345 23:21:16.841 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 346 23:21:16.951 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 347 23:21:16.951 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 348 23:21:16.951 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095275, seq# expected = 3367095275 349 23:21:32.363 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095275 350 23:21:32.363 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 351 23:21:32.483 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 352 23:21:32.483 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 353 23:21:32.483 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095276, seq# expected = 3367095276 354 23:21:42.878 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095276 355 23:21:42.878 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 356 23:21:42.988 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 357 23:21:42.988 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 358 23:21:42.988 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095277, seq# expected = 3367095277 359 23:21:53.393 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095277 360 23:21:53.393 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 361 23:21:53.513 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 362 23:21:53.513 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 363 23:21:53.513 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095278, seq# expected = 3367095278 364 23:22:08.915 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095278 365 23:22:08.915 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 366 23:22:09.026 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 367 23:22:09.026 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 368 23:22:09.026 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095279, seq# expected = 3367095279 369 23:22:29.445 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095279 370 23:22:29.445 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 371 23:22:29.555 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 372 23:22:29.555 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 373 23:22:29.555 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095280, seq# expected = 3367095280 374 23:22:39.960 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095280 375 23:22:39.960 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 376 23:22:40.070 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 377 23:22:40.070 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 378 23:22:40.070 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095281, seq# expected = 3367095281 379 23:24:14.596 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 380 23:28:04.927 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095281 381 23:28:04.927 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 382 23:28:05.048 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 383 23:28:05.048 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 384 23:28:05.048 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095282, seq# expected = 3367095282 385 23:29:14.530 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 386 23:34:15.526 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 387 23:39:16.012 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 388 23:40:03.088 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095282 389 23:40:03.088 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 390 23:40:03.198 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 391 23:40:03.198 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 392 23:40:03.198 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095283, seq# expected = 3367095283 393 23:44:16.498 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 394 23:49:16.820 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 395 23:52:01.485 08/29/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095283 396 23:52:01.485 08/29/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 397 23:52:01.605 08/29/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 398 23:52:01.605 08/29/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 399 23:52:01.605 08/29/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095284, seq# expected = 3367095284 400 23:54:17.679 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 401 23:59:18.108 08/29/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 402 00:04:17.546 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 403 00:09:18.976 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 404 00:12:59.301 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095284 405 00:12:59.301 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 406 00:12:59.421 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 407 00:12:59.421 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 408 00:12:59.421 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095285, seq# expected = 3367095285 409 00:14:18.504 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 410 00:16:06.568 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095285 411 00:16:06.568 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 412 00:16:06.688 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 413 00:16:06.688 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 414 00:16:06.688 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095286, seq# expected = 3367095286 415 00:19:19.354 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 416 00:24:19.802 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 417 00:28:04.616 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095286 418 00:28:04.616 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 419 00:28:04.746 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 420 00:28:04.746 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 421 00:28:04.746 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095287, seq# expected = 3367095287 422 00:29:20.724 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 423 00:34:20.673 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 424 00:39:21.100 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 425 00:42:37.870 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095287 426 00:42:37.870 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 427 00:42:37.980 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 428 00:42:37.980 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 429 00:42:37.980 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095288, seq# expected = 3367095288 430 00:44:21.017 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 431 00:49:21.957 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 432 00:54:22.406 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 433 00:55:29.501 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 434 00:55:29.501 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 435 00:59:22.845 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 436 01:00:55.968 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 437 01:04:23.274 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 438 01:05:10.842 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 439 01:05:10.842 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 440 01:05:19.354 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 441 01:05:30.369 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 442 01:05:37.880 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 443 01:05:48.896 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 444 01:05:49.907 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 445 01:05:53.402 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 446 01:05:57.408 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 447 01:05:57.909 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 448 01:05:59.411 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 449 01:06:01.914 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 450 01:06:12.940 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 451 01:06:17.447 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 452 01:06:25.458 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 453 01:06:37.976 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 454 01:06:39.979 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 455 01:06:42.983 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 456 01:06:47.990 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 457 01:06:52.006 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 458 01:06:53.999 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 459 01:06:57.003 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 460 01:06:59.016 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 461 01:08:16.617 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 462 01:09:24.213 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 463 01:09:32.225 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095288 464 01:09:32.225 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 465 01:09:32.335 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 466 01:09:32.335 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 467 01:09:32.335 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095289, seq# expected = 3367095289 468 01:10:32.311 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 469 01:11:08.372 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 470 01:13:33.603 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 471 01:14:24.181 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 472 01:16:02.844 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 473 01:16:22.875 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 474 01:18:00.029 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 475 01:18:42.601 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 476 01:19:24.182 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 477 01:19:41.708 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 478 01:19:52.224 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 479 01:20:30.290 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 480 01:21:04.340 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 481 01:21:04.840 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 482 01:24:25.134 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 483 01:26:03.298 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 484 01:26:18.811 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 485 01:26:45.350 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 486 01:27:11.899 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 487 01:27:31.928 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 488 01:28:13.990 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095289 489 01:28:13.990 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 490 01:28:14.100 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 491 01:28:14.100 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 492 01:28:14.100 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095290, seq# expected = 3367095290 493 01:29:24.590 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 494 01:33:00.895 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095290 495 01:33:00.895 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 496 01:33:05.902 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095291 497 01:33:05.902 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 498 01:33:10.909 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095292 499 01:33:10.909 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 500 01:33:15.926 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095293 501 01:33:15.926 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 502 01:33:21.424 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095294 503 01:33:21.424 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 504 01:33:21.554 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 505 01:33:21.554 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 506 01:33:21.554 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095295, seq# expected = 3367095295 507 01:34:25.527 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 508 01:36:01.667 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 509 01:39:25.524 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 510 01:40:14.085 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095295 511 01:40:14.085 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 512 01:40:14.195 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 513 01:40:14.195 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 514 01:40:14.195 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095296, seq# expected = 3367095296 515 01:44:26.453 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 516 01:47:22.194 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 517 01:47:56.249 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 518 01:48:14.783 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 519 01:48:45.823 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095296 520 01:48:45.823 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 521 01:48:50.829 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095297 522 01:48:50.829 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 523 01:48:55.836 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095298 524 01:48:55.836 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 525 01:49:00.842 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095299 526 01:49:00.842 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 527 01:49:05.849 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095300 528 01:49:05.849 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 529 01:49:05.969 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 530 01:49:05.969 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 531 01:49:05.969 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095301, seq# expected = 3367095301 532 01:49:26.396 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 533 01:54:27.305 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 534 01:56:30.981 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 535 01:57:39.599 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 536 01:58:19.656 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 537 01:59:09.728 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 538 01:59:27.253 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 539 01:59:39.771 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 540 02:01:19.914 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 541 02:02:20.010 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 542 02:03:00.568 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 543 02:03:20.606 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 544 02:03:20.606 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 545 02:03:40.635 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 546 02:04:28.203 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 547 02:06:00.855 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 548 02:06:20.884 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 549 02:08:21.055 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 550 02:09:29.182 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 551 02:11:22.384 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 552 02:12:02.441 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 553 02:12:42.519 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 554 02:13:02.547 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 555 02:13:22.576 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 556 02:14:28.710 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 557 02:15:02.749 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 558 02:15:22.777 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 559 02:17:22.949 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 560 02:19:03.102 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 561 02:19:29.640 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 562 02:19:43.169 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 563 02:20:03.188 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 564 02:22:33.442 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 565 02:24:21.112 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095301 566 02:24:21.112 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 567 02:24:26.119 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095302 568 02:24:26.119 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 569 02:24:29.134 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 570 02:24:31.127 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095303 571 02:24:31.127 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 572 02:24:36.134 08/30/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 3367095304 573 02:24:36.134 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 574 02:24:36.254 08/30/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 575 02:24:36.254 08/30/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 576 02:24:36.254 08/30/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 3367095305, seq# expected = 3367095305 577 02:25:14.190 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 578 02:27:34.403 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 579 02:29:30.081 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 580 02:29:54.616 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 581 02:31:14.742 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 582 02:32:35.880 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 583 02:32:52.404 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 584 02:32:54.907 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 585 02:34:30.546 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 586 02:35:55.168 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 587 02:36:35.226 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 588 02:36:55.265 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 589 02:37:15.294 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 590 02:37:55.853 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 591 02:39:01.939 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 592 02:39:30.500 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 593 02:39:35.497 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 594 02:39:55.036 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 595 02:40:15.565 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 596 02:42:46.284 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 597 02:43:13.323 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 598 02:43:35.355 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 599 02:44:31.446 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 600 02:44:55.521 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 601 02:45:23.511 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 602 02:45:24.513 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 603 02:46:15.587 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 604 02:48:12.276 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 605 02:48:39.315 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 606 02:48:46.826 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 607 02:49:04.852 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 608 02:49:04.852 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 609 02:49:18.872 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 610 02:49:32.392 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 611 02:49:34.895 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 612 02:49:34.895 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 613 02:49:40.403 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 614 02:49:46.412 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 615 02:50:28.994 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 616 02:51:32.586 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 617 02:51:45.675 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 618 02:51:51.623 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 619 02:52:58.210 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 620 02:53:04.228 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 621 02:54:20.827 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 622 02:54:32.342 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 623 02:54:48.865 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 624 02:54:48.865 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 625 02:54:49.366 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 626 02:55:15.902 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 627 02:57:48.621 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 628 02:57:58.134 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 629 02:58:17.160 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 630 02:58:27.174 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 631 02:58:29.677 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 632 02:58:58.717 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 633 02:59:00.720 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 634 02:59:32.776 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 635 03:00:35.355 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 636 03:00:45.370 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 637 03:00:56.385 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 638 03:01:50.973 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 639 03:02:07.497 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 640 03:02:14.527 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 641 03:02:17.521 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 642 03:02:29.538 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 643 03:02:35.547 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 644 03:02:41.556 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 645 03:02:54.574 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 646 03:02:55.075 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 647 03:03:03.086 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 648 03:03:03.587 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 649 03:03:14.102 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 650 03:03:18.609 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 651 03:03:31.126 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 652 03:03:47.650 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 653 03:03:57.164 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 654 03:04:06.176 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 655 03:04:08.179 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 656 03:04:33.225 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 657 03:04:38.222 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 658 03:04:39.234 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 659 03:04:48.237 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 660 03:04:48.737 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 661 03:05:17.278 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 662 03:05:41.312 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 663 03:05:48.823 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 664 03:05:52.328 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 665 03:05:52.829 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 666 03:06:19.867 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 667 03:06:30.382 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 668 03:06:34.889 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 669 03:06:38.404 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 670 03:09:34.155 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 671 03:11:37.821 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 672 03:11:57.860 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 673 03:14:34.093 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 674 03:14:38.099 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 675 03:14:58.127 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 676 03:17:38.366 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 677 03:19:18.009 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 678 03:19:34.532 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 679 03:20:38.624 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 680 03:20:58.152 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 681 03:23:38.390 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 682 03:24:34.971 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 683 03:24:38.476 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 684 03:27:20.718 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 685 03:28:19.312 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 686 03:28:29.316 08/30/07 Sev=Warning/2 IPSEC/0x6370001E Unexpected TCP control packet received from 128.221.195.16, src port 4005, dst port 1088, flags 10h 687 03:29:35.443 08/30/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1088, dst port 4005 688 03:30:35.932 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 128.221.195.16 689 03:30:35.932 08/30/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 68D5E820 INBOUND SPI = 99FF457B) 690 03:30:35.932 08/30/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=9C2C2D68 691 03:30:35.932 08/30/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=037728FE5787974E R_Cookie=B7D38A564B6F664C) reason = DEL_REASON_RESET_SADB 692 03:30:35.932 08/30/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.16 693 03:30:35.932 08/30/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=037728FE5787974E R_Cookie=B7D38A564B6F664C) reason = DEL_REASON_RESET_SADB 694 03:30:35.932 08/30/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 695 03:30:35.932 08/30/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 696 03:30:35.932 08/30/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 697 03:30:35.932 08/30/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1088 for TCP connection. 698 03:30:35.932 08/30/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 128.221.195.16 disconnected: duration: 0 days 4:51:8 699 03:30:35.932 08/30/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 700 03:30:35.942 08/30/07 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 701 03:30:35.942 08/30/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 702 03:30:37.784 08/30/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 703 05:54:01.706 08/30/07 Sev=Critical/1 FIREWALL/0xE3A00003 Fatal error trying to start the firewall. The firewall has not been started. 704 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x7b45ff99 705 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x7b45ff99 706 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x20e8d568 707 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x20e8d568 708 05:54:03.829 08/30/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.16, src port 1088, dst port 4005 709 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 710 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 711 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 712 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 713 05:54:03.829 08/30/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys