Foundry AR-Series Router User Guide
Step 16: Test the IPSec tunnel between the VPN client and the server by passing traffic from the client to the 10.0.1.0 network.
Step 17: After passing traffic through the tunnel, display the list of clients logged onto the VPN server and the IKE and IPSec SA tables:
Router1# show crypto dynamic clients |
| ||
Client Address | Client Id | Policy |
|
Advanced |
|
|
|
| |||
|
|
| |
192.168.107.105 | sales:20.1.1.1 | ModecfgGrp | |
|
|
|
|
Router1#show crypto ike sa | all |
|
| |
Policy | Peer | State | Bytes | Transform |
sales | 192.168.107.105 | SA_MATURE | 2052 | |
|
|
|
|
|
Router1# show crypto ike sa all detail
Crypto Policy name: sales
Remote ident
Bytes Processed 2052 State is SA_MATURE Mode is Aggressive
Life Time in Sec is unlimited, Life Time in Bytes is unlimited
Router1# show crypto ipsec sa all |
|
| ||
Policy | Dest IP | Spi | Bytes | Transform |
INsales | 172.16.0.10xbba97427 840 |
| ||
sales | 192.168.107.1050xcb0e23f3 560 | |||
|
|
|
|
|
15 - 44 | © 2004 Foundry Networks, Inc. | June 2004 |