Chapter 14 IPSec VPN

Figure 208 VPN Log Example

ras> sys log disp ike ipsec

 

 

# .time

source

destination

notes

message

18:47:22 5.6.7.8

5.1.2.3

IKE

001/11/2001

Rule [ex-1] Tunnel built successfully

5.1.2.3

IKE

101/11/2001

18:47:22 5.6.7.8

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

201/11/2001

18:47:22 5.6.7.8

5.1.2.3

Send:[HASH]

18:47:22 5.6.7.8

5.1.2.3

IKE

301/11/2001

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

401/11/2001

18:47:22 5.6.7.8

5.1.2.3

Adjust TCP

MSS to 1398

5.6.7.8

IKE

501/11/2001

18:47:22 5.1.2.3

Recv:[HASH][SA][NONCE][ID][ID]

5.6.7.8

IKE

601/11/2001

18:47:22 5.1.2.3

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

701/11/2001

18:47:21 5.6.7.8

5.1.2.3

IKE Packet

Retransmit

5.1.2.3

IKE

801/11/2001

18:47:21 5.6.7.8

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

901/11/2001

18:47:17 5.6.7.8

5.1.2.3

Send:[HASH][SA][NONCE][ID][ID]

5.1.2.3

IKE

1001/11/2001

18:47:17 5.6.7.8

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

1101/11/2001

18:47:17 5.6.7.8

5.1.2.3

Start Phase 2: Quick Mode

5.1.2.3

IKE

1201/11/2001

18:47:17 5.6.7.8

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

1301/11/2001

18:47:17 5.6.7.8

5.1.2.3

Phase 1 IKE SA process done

5.1.2.3

IKE

1401/11/2001

18:47:17 5.6.7.8

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

1501/11/2001

18:47:17 5.1.2.3

5.6.7.8

Recv:[ID][HASH][NOTFY:INIT_CONTACT]9C3F7DCA

5.6.7.8

IKE

1601/11/2001

18:47:17 5.1.2.3

The cookie

pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA

IKE

1701/11/2001

18:47:15 5.6.7.8

5.1.2.3

Send:[ID][HASH][NOTFY:INIT_CONTACT]9C3F7DCA

14.12 IPSec Debug

If you are having difficulty building an IPSec tunnel to a non-ZyXEL IPSec router, advanced users may wish to examine the IPSec debug feature (in the commands).

 

331

ZyWALL 2WG User’s Guide