2357 14:43:39.679 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from x.x.x.x 2358 14:43:39.679 08/18/09 Sev=Info/5 IKE/0x63000040 Received DPD ACK from x.x.x.x, seq# received = 73430725, seq# expected = 73430725 2359 14:43:50.237 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2360 14:43:50.238 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430726 2361 14:43:50.414 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2362 14:43:50.415 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from x.x.x.x 2363 14:43:50.415 08/18/09 Sev=Info/5 IKE/0x63000040 Received DPD ACK from x.x.x.x, seq# received = 73430726, seq# expected = 73430726 2364 14:43:54.285 08/18/09 Sev=Info/4 IKE/0x6300007D Initiating IKE SA rekey: I_Cookie=DB356E34754BE347 R_Cookie=0000000000000000 2365 14:43:54.310 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to x.x.x.x 2366 14:43:55.211 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2367 14:43:55.212 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK AG (SA, VID(Unity), VID(dpd), VID(?), VID(Xauth), VID(Nat-T), KE, ID, NON, HASH, NAT-D, NAT-D) from x.x.x.x 2368 14:43:55.212 08/18/09 Sev=Info/5 IKE/0x63000001 Peer is a Cisco-Unity compliant peer 2369 14:43:55.212 08/18/09 Sev=Info/5 IKE/0x63000001 Peer supports DPD 2370 14:43:55.212 08/18/09 Sev=Info/5 IKE/0x63000001 Peer supports DWR Code and DWR Text 2371 14:43:55.212 08/18/09 Sev=Info/5 IKE/0x63000001 Peer supports XAUTH 2372 14:43:55.212 08/18/09 Sev=Info/5 IKE/0x63000001 Peer supports NAT-T 2373 14:43:55.240 08/18/09 Sev=Info/6 IKE/0x63000001 IOS Vendor ID Contruction successful 2374 14:43:55.240 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG *(HASH, NAT-D, NAT-D, VID(?), VID(Unity)) to x.x.x.x 2375 14:43:55.241 08/18/09 Sev=Info/5 IKE/0x63000072 Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device 2376 14:43:55.241 08/18/09 Sev=Info/4 CM/0x6310000E Established Phase 1 SA. 2 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system 2377 14:43:55.412 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2378 14:43:55.413 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from x.x.x.x 2379 14:43:55.413 08/18/09 Sev=Info/5 IKE/0x63000045 RESPONDER-LIFETIME notify has value of 3600 seconds 2380 14:43:55.413 08/18/09 Sev=Info/5 IKE/0x63000047 This SA has already been alive for 1 seconds, setting expiry to 3599 seconds from now 2381 14:43:55.417 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2382 14:43:55.417 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from x.x.x.x 2383 14:43:55.417 08/18/09 Sev=Info/4 CM/0x63100015 Launch xAuth application 2384 14:44:00.472 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2385 14:44:00.472 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x 2386 14:44:00.472 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2387 14:44:00.474 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430727 2388 14:44:00.659 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2389 14:44:00.659 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from x.x.x.x 2390 14:44:00.659 08/18/09 Sev=Info/5 IKE/0x63000040 Received DPD ACK from x.x.x.x, seq# received = 73430727, seq# expected = 73430727 2391 14:44:05.420 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2392 14:44:05.420 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x 2393 14:44:10.425 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2394 14:44:10.426 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x 2395 14:44:11.021 08/18/09 Sev=Info/4 IPSEC/0x6370000E Key with outbound SPI=0x66c25b0d is about to expire, requesting a new one 2396 14:44:11.022 08/18/09 Sev=Info/4 IPSEC/0x6370000B Key requested 2397 14:44:11.022 08/18/09 Sev=Info/4 IKE/0x63000056 Received a key request from Driver: Local IP = 192.168.254.80, GW IP = x.x.x.x, Remote IP = 0.0.0.0 2398 14:44:11.022 08/18/09 Sev=Info/4 IKE/0x63000051 Initiating IKE Phase 2 (MsgID=5C9C6A71) Initiator = ID=192.168.254.80 Protocol=0 port=0, Responder = ID=0.0.0.0/0.0.0.0 Protocol=0 port=0 2399 14:44:11.024 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to x.x.x.x 2400 14:44:11.026 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2401 14:44:11.026 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430728 2402 14:44:11.345 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2403 14:44:11.346 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from x.x.x.x 2404 14:44:11.346 08/18/09 Sev=Info/5 IKE/0x63000040 Received DPD ACK from x.x.x.x, seq# received = 73430728, seq# expected = 73430728 2405 14:44:15.423 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2406 14:44:15.423 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x 2407 14:44:16.096 08/18/09 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 2408 14:44:16.097 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(Retransmission) to x.x.x.x 2409 14:44:20.414 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2410 14:44:20.415 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x 2411 14:44:21.165 08/18/09 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 2412 14:44:21.166 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(Retransmission) to x.x.x.x 2413 14:44:21.676 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2414 14:44:21.677 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430729 2415 14:44:26.233 08/18/09 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 2416 14:44:26.233 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK QM *(Retransmission) to x.x.x.x 2417 14:44:26.745 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2418 14:44:26.746 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430730 2419 14:44:31.306 08/18/09 Sev=Info/4 IKE/0x6300002D Phase-2 retransmission count exceeded: MsgID=5C9C6A71 2420 14:44:31.307 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to x.x.x.x 2421 14:44:31.307 08/18/09 Sev=Info/4 IKE/0x63000049 Discarding IPsec SA negotiation, MsgID=5C9C6A71 2422 14:44:31.821 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2423 14:44:31.822 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430731 2424 14:44:36.885 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2425 14:44:36.885 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430732 2426 14:44:41.954 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2427 14:44:41.955 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430733 2428 14:44:47.029 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to x.x.x.x 2429 14:44:47.030 08/18/09 Sev=Info/6 IKE/0x6300003D Sending DPD request to x.x.x.x, our seq# = 73430734 2430 14:44:50.724 08/18/09 Sev=Info/5 IKE/0x6300002F Received ISAKMP packet: peer = x.x.x.x 2431 14:44:50.725 08/18/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from x.x.x.x 2432 14:44:50.725 08/18/09 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=5D517DBBDE7DB6CF R_Cookie=33386B2A9C399BA5 2433 14:44:50.725 08/18/09 Sev=Info/4 IKE/0x6300007F Transferring QM centry MsgID=2887E043 to SA(I_Cookie=DB356E34754BE347 R_Cookie=33386B2AC95373DB) 2434 14:44:50.726 08/18/09 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=5D517DBBDE7DB6CF R_Cookie=33386B2A9C399BA5) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED 2435 14:44:51.595 08/18/09 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=5D517DBBDE7DB6CF R_Cookie=33386B2A9C399BA5) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED 2436 14:44:51.595 08/18/09 Sev=Info/4 CM/0x63100013 Phase 1 SA deleted cause by PEER_DELETE-IKE_DELETE_UNSPECIFIED. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 2437 14:54:17.152 08/18/09 Sev=Info/4 CM/0x63100017 xAuth application returned 2438 14:54:17.152 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to x.x.x.x 2439 14:55:33.428 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to x.x.x.x 2440 14:55:33.429 08/18/09 Sev=Info/5 IKE/0x63000018 Deleting IPsec SA: (OUTBOUND SPI = D5BC266 INBOUND SPI = 433019AE) 2441 14:55:33.429 08/18/09 Sev=Info/4 IKE/0x63000049 Discarding IPsec SA negotiation, MsgID=2887E043 2442 14:55:33.430 08/18/09 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=DB356E34754BE347 R_Cookie=33386B2AC95373DB) reason = DEL_REASON_CANNOT_AUTH 2443 14:55:33.430 08/18/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to x.x.x.x 2444 14:55:34.438 08/18/09 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0xae193043 2445 14:55:34.439 08/18/09 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0xae193043 2446 14:55:34.439 08/18/09 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x66c25b0d 2447 14:55:34.439 08/18/09 Sev=Info/4 IPSEC/0x6370000C Key deleted by SPI 0x66c25b0d 2448 14:55:34.439 08/18/09 Sev=Info/4 IPSEC/0x63700010 Created a new key structure 2449 14:55:34.439 08/18/09 Sev=Info/4 IPSEC/0x6370000B Key requested 2450 14:55:34.439 08/18/09 Sev=Info/4 IKE/0x63000056 Received a key request from Driver: Local IP = 192.168.254.80, GW IP = 0.0.0.0, Remote IP = 192.168.4.4 2451 14:55:34.440 08/18/09 Sev=Warning/3 IKE/0xE3000066 Could not find an IKE SA for 192.168.4.4. KEY_REQ aborted. 2452 14:55:34.440 08/18/09 Sev=Warning/2 IKE/0xE300009B Failed to initiate P2 rekey: Error dectected (Initiate:176) 2453 14:55:34.440 08/18/09 Sev=Warning/2 IKE/0xE300009B Unable to initiate QM (IKE_MAIN:463) 2454 14:55:34.440 08/18/09 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=DB356E34754BE347 R_Cookie=33386B2AC95373DB) reason = DEL_REASON_CANNOT_AUTH 2455 14:55:34.441 08/18/09 Sev=Info/4 CM/0x63100023 Unable to establish additional Phase 1 SA with server "x.x.x.x" because of "DEL_REASON_CANNOT_AUTH". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system 2456 14:55:34.441 08/18/09 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 2457 14:55:34.461 08/18/09 Sev=Info/6 CM/0x63100031 Tunnel to headend device x.x.x.x disconnected: duration: 0 days 1:47:31 2458 14:55:34.471 08/18/09 Sev=Info/6 CM/0x63100046 Set tunnel established flag in registry to 0. 2459 14:55:34.472 08/18/09 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 2460 14:55:34.523 08/18/09 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 75.200.182.162 75.200.182.162 51 x.x.x.x 255.255.255.255 75.200.182.162 75.200.182.162 100 75.200.182.162 255.255.255.255 75.200.182.162 75.200.182.162 306 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 4531 127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 4531 127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 4531 192.168.4.0 255.255.255.0 192.168.254.1 192.168.254.80 100 192.168.254.0 255.255.255.0 192.168.254.80 192.168.254.80 306 192.168.254.80 255.255.255.255 192.168.254.80 192.168.254.80 306 192.168.254.255 255.255.255.255 192.168.254.80 192.168.254.80 306 224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 4531 224.0.0.0 240.0.0.0 75.200.182.162 75.200.182.162 51 224.0.0.0 240.0.0.0 192.168.254.80 192.168.254.80 306 255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 4531 255.255.255.255 255.255.255.255 75.200.182.162 75.200.182.162 306 255.255.255.255 255.255.255.255 192.168.254.80 192.168.254.80 306 2461 14:55:34.526 08/18/09 Sev=Info/6 CM/0x63100037 The routing table was returned to original state prior to Virtual Adapter 2462 14:55:35.499 08/18/09 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: CheckUpVASettings: Found IPADDR entry addr=192.168.254.80, error 0 2463 14:55:36.519 08/18/09 Sev=Warning/2 CVPND/0xA3400015 Error with call to IpHlpApi.DLL: CleanUpVASettings: Was able to delete all VA settings after all, error 0 2464 14:55:37.048 08/18/09 Sev=Info/5 CVPND/0x63400013 Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 75.200.182.162 75.200.182.162 51 75.200.182.162 255.255.255.255 75.200.182.162 75.200.182.162 306 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 4531 127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 4531 127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 4531 224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 4531 224.0.0.0 240.0.0.0 75.200.182.162 75.200.182.162 51 255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 4531 255.255.255.255 255.255.255.255 75.200.182.162 75.200.182.162 306 2465 14:55:37.048 08/18/09 Sev=Info/4 CM/0x63100035 The Virtual Adapter was disabled 2466 14:55:37.062 08/18/09 Sev=Info/4 IPSEC/0x63700013 Delete internal key with SPI=0x00000000 2467 14:55:37.062 08/18/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 2468 14:55:37.062 08/18/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 2469 14:55:37.062 08/18/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 2470 14:55:37.062 08/18/09 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped