
Chapter 14 IPSec VPN
Figure 208 VPN Log Example
ras> sys log disp ike ipsec |
|
| |
# .time | source | destination | notes |
message | 18:47:22 5.6.7.8 | 5.1.2.3 | IKE |
001/11/2001 | |||
Rule | 5.1.2.3 | IKE | |
101/11/2001 | 18:47:22 5.6.7.8 | ||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
201/11/2001 | 18:47:22 5.6.7.8 | 5.1.2.3 | |
Send:[HASH] | 18:47:22 5.6.7.8 | 5.1.2.3 | IKE |
301/11/2001 | |||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
401/11/2001 | 18:47:22 5.6.7.8 | 5.1.2.3 | |
Adjust TCP | MSS to 1398 | 5.6.7.8 | IKE |
501/11/2001 | 18:47:22 5.1.2.3 | ||
Recv:[HASH][SA][NONCE][ID][ID] | 5.6.7.8 | IKE | |
601/11/2001 | 18:47:22 5.1.2.3 | ||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
701/11/2001 | 18:47:21 5.6.7.8 | 5.1.2.3 | |
IKE Packet | Retransmit | 5.1.2.3 | IKE |
801/11/2001 | 18:47:21 5.6.7.8 | ||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
901/11/2001 | 18:47:17 5.6.7.8 | 5.1.2.3 | |
Send:[HASH][SA][NONCE][ID][ID] | 5.1.2.3 | IKE | |
1001/11/2001 | 18:47:17 5.6.7.8 | ||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
1101/11/2001 | 18:47:17 5.6.7.8 | 5.1.2.3 | |
Start Phase 2: Quick Mode | 5.1.2.3 | IKE | |
1201/11/2001 | 18:47:17 5.6.7.8 | ||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
1301/11/2001 | 18:47:17 5.6.7.8 | 5.1.2.3 | |
Phase 1 IKE SA process done | 5.1.2.3 | IKE | |
1401/11/2001 | 18:47:17 5.6.7.8 | ||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
1501/11/2001 | 18:47:17 5.1.2.3 | 5.6.7.8 | |
Recv:[ID][HASH][NOTFY:INIT_CONTACT]9C3F7DCA | 5.6.7.8 | IKE | |
1601/11/2001 | 18:47:17 5.1.2.3 | ||
The cookie | pair is : 0xDAC0B43FBDE154F5 / 0xC5156C099C3F7DCA | IKE | |
1701/11/2001 | 18:47:15 5.6.7.8 | 5.1.2.3 |
Send:[ID][HASH][NOTFY:INIT_CONTACT]9C3F7DCA
14.12 IPSec Debug
If you are having difficulty building an IPSec tunnel to a
| 331 |
ZyWALL 2WG User’s Guide | |
|
|