Foundry AR-Series Router User Guide

Step 17: Test the IPSec tunnel between the VPN client and the server by passing traffic from the client to the 10.0.1.0 network.

Step 18: After passing traffic through the tunnel, display the list of clients logged onto the VPN server and the IKE and IPSec SA tables:

Router1# show crypto dynamic clients

 

 

Client Address

Client Id

Policy

Advanced

--------------

---------

------

--------

192.168.107.105 david@abc-corp...

sales

UserGrp

 

 

 

 

Router1# show crypto ike sa all

 

 

Policy

Peer

State

Bytes

Transform

------

----

-----

-----

---------

 

 

 

 

 

 

Router1# show crypto ike sa all detail

 

 

Crypto Policy name: sales

 

 

 

Remote

ident david@abc-corp.com

 

 

Peer Address is 192.168.107.105

 

 

Transform: 3des, sha1, pre-shared-key

 

DH Group: group1

 

 

 

Bytes Processed 1772

 

 

 

State is SA_MATURE

 

 

 

Mode is Aggressive

 

 

 

 

 

 

 

 

 

 

 

Router1# show crypto ipsec

sa all

 

 

Policy

Dest IP

Spi

Bytes

Transform

------

-------

---

-----

---------

INsales

172.16.0.1 0xf43c5e3b 360

 

esp-aes-sha1-tunl

sales

192.168.107.105

0xcfea8435

240

esp-aes-sha1-tunl

 

 

 

 

 

15 - 36

© 2004 Foundry Networks, Inc.

June 2004

Page 261
Image 261
Foundry Networks AR3201-CL, AR3202-CL, AR1204, AR1216, AR1208 manual Foundry AR-Series Router User Guide