EMC VPN Dialer Version 4.6.00.0045 Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Program Files\EMC VPN\VPN Client 1 22:50:27.096 09/05/07 Sev=Info/4 CM/0x63100002 Begin connection process 2 22:50:27.136 09/05/07 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 3 22:50:27.136 09/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 4 22:50:27.156 09/05/07 Sev=Info/6 CM/0x6310002F Allocated local TCP port 1325 for TCP connection. 5 22:50:27.527 09/05/07 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 6 22:50:27.527 09/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 7 22:50:27.527 09/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.15, src port 1325, dst port 4005 8 22:50:27.527 09/05/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.15, src port 4005, dst port 1325 9 22:50:27.527 09/05/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.15, src port 1325, dst port 4005 10 22:50:27.527 09/05/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "usvgw1.emc.com" 11 22:50:28.027 09/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "usvgw1.emc.com" 12 22:50:28.037 09/05/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.15. 13 22:50:28.067 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.15 14 22:50:28.348 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 15 22:50:28.348 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.15 16 22:50:28.348 09/05/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 17 22:50:28.348 09/05/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 18 22:50:28.348 09/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 19 22:50:28.348 09/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 20 22:50:28.458 09/05/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 21 22:50:28.458 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.15 22 22:50:28.458 09/05/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 23 22:50:28.458 09/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 24 22:50:36.349 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 25 22:50:36.349 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (Retransmission) from 128.221.195.15 26 22:50:36.349 09/05/07 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 27 22:50:36.349 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(Retransmission) to 128.221.195.15 28 22:50:36.470 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.15 29 22:50:36.470 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:LOAD_BALANCE) from 128.221.195.15 30 22:50:36.470 09/05/07 Sev=Info/4 CM/0x6310001B Received alternative server address "128.221.195.16" from primary server 31 22:50:36.470 09/05/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=B1F9BC77957509A0 R_Cookie=BC1C6188C5AB89D8) reason = DEL_REASON_LOAD_BALANCING 32 22:50:36.470 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.15 33 22:50:37.030 09/05/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=B1F9BC77957509A0 R_Cookie=BC1C6188C5AB89D8) reason = DEL_REASON_LOAD_BALANCING 34 22:50:37.030 09/05/07 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "usvgw1.emc.com" because of "DEL_REASON_LOAD_BALANCING" 35 22:50:37.030 09/05/07 Sev=Info/4 CM/0x63100010 Try alternative server "128.221.195.16" given by the primary server 36 22:50:37.030 09/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 37 22:50:37.040 09/05/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 38 22:50:37.050 09/05/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.15, src port 1325, dst port 4005 39 22:50:37.050 09/05/07 Sev=Info/6 IPSEC/0x6370001F TCP SYN sent to 128.221.195.16, src port 1325, dst port 4005 40 22:50:38.032 09/05/07 Sev=Info/6 IPSEC/0x6370001C TCP SYN-ACK received from 128.221.195.16, src port 4005, dst port 1325 41 22:50:38.032 09/05/07 Sev=Info/6 IPSEC/0x63700020 TCP ACK sent to 128.221.195.16, src port 1325, dst port 4005 42 22:50:38.032 09/05/07 Sev=Info/4 CM/0x63100029 TCP connection established on port 4005 with server "128.221.195.16" 43 22:50:38.532 09/05/07 Sev=Info/4 CM/0x63100024 Attempt connection with server "128.221.195.16" 44 22:50:38.553 09/05/07 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 128.221.195.16. 45 22:50:38.573 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to 128.221.195.16 46 22:50:38.843 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 47 22:50:38.843 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(dpd), VID(Frag), VID(?), VID(?)) from 128.221.195.16 48 22:50:38.843 09/05/07 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 49 22:50:38.843 09/05/07 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 50 22:50:38.843 09/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DPD 51 22:50:38.843 09/05/07 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 52 22:50:38.843 09/05/07 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 53 22:50:38.843 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to 128.221.195.16 54 22:50:38.853 09/05/07 Sev=Info/4 IKE/0x63000082 IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4 55 22:50:38.853 09/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 56 22:50:38.963 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 57 22:50:38.963 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 58 22:50:38.963 09/05/07 Sev=Info/4 CM/0x63100015 Launch xAuth application 59 22:50:49.018 09/05/07 Sev=Info/4 CM/0x63100017 xAuth application returned 60 22:50:49.018 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 61 22:50:52.943 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 62 22:50:52.943 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 63 22:50:52.943 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 64 22:50:52.943 09/05/07 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 65 22:50:53.053 09/05/07 Sev=Info/5 IKE/0x6300005D Client sending a firewall request to concentrator 66 22:50:53.053 09/05/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=Cisco Systems Integrated Client, Capability= (Centralized Protection Policy). 67 22:50:53.053 09/05/07 Sev=Info/5 IKE/0x6300005C Firewall Policy: Product=NetworkICE BlackICE Defender, Capability= (Are you There?). 68 22:50:53.053 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 128.221.195.16 69 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 70 22:50:54.045 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 128.221.195.16 71 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.4.9.80 72 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NETMASK: , value = 255.255.224.0 73 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 128.221.12.10 74 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 128.222.67.10 75 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 128.221.12.10 76 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x63000010 MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 128.222.67.10 77 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_BANNER, value = ************** EMC Americas East Coast VPN Gateway ************** ATTENTION!!! If you are running a VPN Client version other than 4.6, you must upgrade as soon as possible. Check the title bar of your VPN Dialer application. If it does not start with VPN Dialer-Version 4.6, disconnect from VPN now and visit http://vpndist.emc.com. Download and install "DTP3.6-VPN4.6.EXE". 78 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000 79 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = corp.emc.com 80 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x6300000D MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000 81 22:50:54.045 09/05/07 Sev=Info/5 IKE/0x6300000E MODE_CFG_REPLY: Attribute = APPLICATION_VERSION, value = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.7.2.B built by vmurphy on Oct 04 2005 02:50:52 82 22:50:54.155 09/05/07 Sev=Info/4 CM/0x63100019 Mode Config data received 83 22:50:54.165 09/05/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.9.80, GW IP = 128.221.195.16, Remote IP = 0.0.0.0 84 22:50:54.165 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.16 85 22:50:54.175 09/05/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 86 22:50:54.175 09/05/07 Sev=Info/6 IPSEC/0x6370002B Sent 9 packets, 0 were fragmented. 87 22:50:54.295 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 88 22:50:54.295 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 89 22:50:54.295 09/05/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 86400 seconds 90 22:50:54.295 09/05/07 Sev=Info/5 IKE/0x63000046 This SA has already been alive for 16 seconds, setting expiry to 86384 seconds from now 91 22:50:54.305 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 92 22:50:54.305 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 93 22:50:54.305 09/05/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 94 22:50:54.305 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.16 95 22:50:54.305 09/05/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=A30E720A OUTBOUND SPI = 0x0C5EBE91 INBOUND SPI = 0x46CA4E1C) 96 22:50:54.305 09/05/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x0C5EBE91 97 22:50:54.305 09/05/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x46CA4E1C 98 22:50:57.430 09/05/07 Sev=Info/4 CM/0x63100034 The Virtual Adapter was enabled: IP=10.4.9.80/255.255.224.0 DNS=128.221.12.10,128.222.67.10 WINS=128.221.12.10,128.222.67.10 Domain=corp.emc.com Split DNS Names= 99 22:50:57.510 09/05/07 Sev=Info/6 CM/0x63100036 The routing table was updated for the Virtual Adapter 100 22:50:57.530 09/05/07 Sev=Info/4 CM/0x6310001A One secure connection established 101 22:50:57.760 09/05/07 Sev=Info/4 CM/0x63100038 Address watch added for 192.168.1.102. Current address(es): 192.168.1.102, 10.4.9.80, 192.168.186.1, 192.168.121.1. 102 22:50:57.760 09/05/07 Sev=Info/4 CM/0x63100038 Address watch added for 10.4.9.80. Current address(es): 192.168.1.102, 10.4.9.80, 192.168.186.1, 192.168.121.1. 103 22:50:57.890 09/05/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 104 22:50:57.890 09/05/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x91be5e0c into key list 105 22:50:57.890 09/05/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 106 22:50:57.890 09/05/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x1c4eca46 into key list 107 22:50:57.890 09/05/07 Sev=Info/4 IPSEC/0x6370002E Assigned VA private interface addr 10.4.9.80 108 22:51:01.566 09/05/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x91be5e0c for inbound key with SPI=0x1c4eca46 109 22:52:38.205 09/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2896567774 110 22:52:38.205 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 111 22:52:38.325 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 112 22:52:38.325 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 113 22:52:38.325 09/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2896567775, seq# expected = 2896567775 114 22:53:38.822 09/05/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2896567775 115 22:53:38.822 09/05/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 116 22:53:38.942 09/05/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 117 22:53:38.942 09/05/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 118 22:53:38.942 09/05/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2896567776, seq# expected = 2896567776 119 22:55:39.515 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 120 23:00:39.947 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 121 23:05:40.389 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 122 23:10:40.821 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 123 23:15:41.253 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 124 23:20:41.395 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 125 23:25:41.983 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 126 23:30:41.105 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 127 23:35:42.038 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 128 23:40:42.470 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 129 23:45:42.902 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 130 23:50:43.334 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 131 23:55:43.766 09/05/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 132 00:00:43.679 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 133 00:05:44.189 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 134 00:10:44.600 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 135 00:15:45.030 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 136 00:20:45.503 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 137 00:25:45.929 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 138 00:30:46.355 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 139 00:35:46.806 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 140 00:40:47.242 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 141 00:45:47.674 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 142 00:50:48.106 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 143 00:55:48.538 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 144 01:00:48.970 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 145 01:05:49.402 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 146 01:10:49.813 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 147 01:15:50.239 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 148 01:20:50.665 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 149 01:25:51.117 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 150 01:30:51.560 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 151 01:35:51.992 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 152 01:40:52.423 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 153 01:45:52.853 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 154 01:50:53.285 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 155 01:55:53.717 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 156 02:00:54.149 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 157 02:05:54.581 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 158 02:10:55.013 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 159 02:15:55.445 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 160 02:20:55.877 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 161 02:25:56.309 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 162 02:30:56.741 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 163 02:35:57.188 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 164 02:40:57.623 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 165 02:45:58.058 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 166 02:50:58.493 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 167 02:55:58.928 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 168 03:00:59.363 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 169 03:05:59.784 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 170 03:11:00.160 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 171 03:16:00.577 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 172 03:21:00.994 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 173 03:26:01.411 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 174 03:31:01.828 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 175 03:36:02.245 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 176 03:41:02.710 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 177 03:46:03.207 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 178 03:51:03.636 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 179 03:56:04.065 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 180 04:01:04.494 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 181 04:06:04.923 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 182 04:11:05.352 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 183 04:16:05.789 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 184 04:21:06.225 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 185 04:26:06.654 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 186 04:31:07.083 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 187 04:36:07.512 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 188 04:41:07.941 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 189 04:46:08.370 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 190 04:51:08.797 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 191 04:56:09.225 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 192 05:01:09.664 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 193 05:06:10.093 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 194 05:11:10.522 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 195 05:14:54.341 09/06/07 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x91be5e0c is about to expire, requesting a new one 196 05:14:54.341 09/06/07 Sev=Info/4 IKE/0x63000055 Received a key request from Driver: Local IP = 10.4.9.80, GW IP = 128.221.195.16, Remote IP = 0.0.0.0 197 05:14:54.341 09/06/07 Sev=Info/4 IKE/0x63000050 Initiating IKE Phase 2 (MsgID=E3BC5C96) Initiator = ID=10.4.9.80 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 198 05:14:54.341 09/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 128.221.195.16 199 05:14:54.462 09/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 200 05:14:54.462 09/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 128.221.195.16 201 05:14:54.462 09/06/07 Sev=Info/5 IKE/0x63000044 RESPONDER-LIFETIME notify has value of 28800 seconds 202 05:14:54.462 09/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH) to 128.221.195.16 203 05:14:54.462 09/06/07 Sev=Info/5 IKE/0x63000058 Loading IPsec SA (MsgID=E3BC5C96 OUTBOUND SPI = 0x38804842 INBOUND SPI = 0x979859EF) 204 05:14:54.472 09/06/07 Sev=Info/5 IKE/0x63000025 Loaded OUTBOUND ESP SPI: 0x38804842 205 05:14:54.472 09/06/07 Sev=Info/5 IKE/0x63000026 Loaded INBOUND ESP SPI: 0x979859EF 206 05:14:54.472 09/06/07 Sev=Info/4 CM/0x63100021 Additional Phase 2 SA established. 207 05:14:54.852 09/06/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 208 05:14:54.852 09/06/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0x42488038 into key list 209 05:14:54.852 09/06/07 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 210 05:14:54.852 09/06/07 Sev=Info/4 IPSEC/0x6370000F Added key with SPI=0xef599897 into key list 211 05:15:24.464 09/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 212 05:15:24.464 09/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from 128.221.195.16 213 05:15:24.464 09/06/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = C5EBE91 INBOUND SPI = 46CA4E1C) 214 05:15:24.464 09/06/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=A30E720A 215 05:15:24.885 09/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x1c4eca46 216 05:15:24.885 09/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x1c4eca46 217 05:15:24.885 09/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x91be5e0c 218 05:15:24.885 09/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x91be5e0c 219 05:15:24.885 09/06/07 Sev=Info/4 IPSEC/0x63700019 Activate outbound key with SPI=0x42488038 for inbound key with SPI=0xef599897 220 05:16:10.450 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 221 05:21:11.380 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 222 05:26:11.809 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 223 05:31:12.238 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 224 05:36:12.667 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 225 05:41:13.096 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 226 05:46:13.525 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 227 05:51:13.954 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 228 05:56:14.388 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 229 06:01:14.854 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 230 06:06:15.289 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 231 06:11:15.724 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 232 06:16:16.159 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 233 06:21:16.594 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 234 06:26:17.029 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 235 06:31:17.464 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 236 06:36:17.899 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 237 06:41:18.334 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 238 06:46:18.769 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 239 06:51:19.204 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 240 06:56:19.639 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 241 07:01:20.074 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 242 07:06:20.485 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 243 07:11:20.885 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 244 07:16:21.314 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 245 07:21:21.743 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 246 07:26:22.172 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 247 07:31:22.601 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 248 07:36:23.020 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 249 07:41:23.449 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 250 07:46:23.878 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 251 07:46:48.914 09/06/07 Sev=Info/6 IKE/0x6300003D Sending DPD request to 128.221.195.16, seq# = 2896567776 252 07:46:48.914 09/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to 128.221.195.16 253 07:46:49.034 09/06/07 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = 128.221.195.16 254 07:46:49.034 09/06/07 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from 128.221.195.16 255 07:46:49.034 09/06/07 Sev=Info/5 IKE/0x6300003F Received DPD ACK from 128.221.195.16, seq# received = 2896567777, seq# expected = 2896567777 256 07:51:24.317 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 257 07:56:24.786 09/06/07 Sev=Info/6 IPSEC/0x63700021 TCP heartbeat sent to 128.221.195.16, src port 1325, dst port 4005 258 07:59:16.892 09/06/07 Sev=Info/4 CM/0x6310000A Secure connections terminated 259 07:59:16.892 09/06/07 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 260 07:59:16.892 09/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 128.221.195.16 261 07:59:16.892 09/06/07 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = 38804842 INBOUND SPI = 979859EF) 262 07:59:16.892 09/06/07 Sev=Info/4 IKE/0x63000048 Discarding IPsec SA negotiation, MsgID=E3BC5C96 263 07:59:16.892 09/06/07 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=C2857F90562568AA R_Cookie=0F534D963507B99F) reason = DEL_REASON_RESET_SADB 264 07:59:16.892 09/06/07 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 128.221.195.16 265 07:59:16.892 09/06/07 Sev=Info/4 IKE/0x6300004A Discarding IKE SA negotiation (I_Cookie=C2857F90562568AA R_Cookie=0F534D963507B99F) reason = DEL_REASON_RESET_SADB 266 07:59:16.892 09/06/07 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 267 07:59:16.892 09/06/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 268 07:59:16.892 09/06/07 Sev=Info/4 CM/0x6310002D Resetting TCP connection on port 4005 269 07:59:16.892 09/06/07 Sev=Info/6 CM/0x63100030 Removed local TCP port 1325 for TCP connection. 270 07:59:16.892 09/06/07 Sev=Info/6 CM/0x63100031 Tunnel to headend device 128.221.195.16 disconnected: duration: 0 days 9:8:19 271 07:59:16.902 09/06/07 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: DeleteIpForwardEntry, error 87 272 07:59:16.912 09/06/07 Sev=Info/6 CM/0x63100037 The routing table was returned to orginal state prior to Virtual Adapter 273 07:59:18.664 09/06/07 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 274 07:59:18.674 09/06/07 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 275 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xef599897 276 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xef599897 277 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x42488038 278 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x42488038 279 07:59:18.674 09/06/07 Sev=Info/6 IPSEC/0x63700022 TCP RST sent to 128.221.195.16, src port 1325, dst port 4005 280 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 281 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 282 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped 283 07:59:18.674 09/06/07 Sev=Info/4 IPSEC/0x63700014 Deleted all keys