D-Link DFL-1660 User Manual page 453

Network security firewall
Hide thumbs Also See for DFL-1660:
Table of Contents

Advertisement

9.4.5. Troubleshooting with ikesnoop
The output from verbose option can be troublesome to interpret by an administrator seeing it for the
first time. Presented below is some typical ikesnoop output with annotations to explain it. The tunnel
negotiation considered is based on Pre-shared Keys. A negotiation based on certificates is not
discussed here but the principles are similar.
Complete ikesnoop command options can be found in the CLI Reference Guide.
The Client and the Server
The two parties involved in the tunnel negotiation are referred to in this section as the client and
server. In this context, the word "client" is used to refer to the device which is the initiator of the
negotiation and the server refers to the device which is the responder.
Step 1. Client Initiates Exchange by Sending a Supported Algorithm List
The verbose option output initially shows the proposed list of algorithms that the client first sends to
the server. This list details the protocols and encryption methods it can support. The purpose of the
algorithm list is that the client is trying to find a matching set of protocols/methods supported by the
server. The server examines the list and attempts to find a combination of the protocols/methods
sent by the client which it can support. This matching process is one of the key purposes of the IKE
exchange.
IkeSnoop: Received IKE packet from 192.168.0.10:500 Exchange type :
Identity Protection (main mode) ISAKMP Version : 1.0
Flags
Cookies
Message ID
Packet length
# payloads
Payloads:
SA (Security Association)
Payload data length : 152 bytes
DOI : 1 (IPsec DOI)
Proposal 1/1
Protocol 1/1
:
: 0x6098238b67d97ea6 -> 0x00000000
: 0x00000000
: 324 bytes
: 8
Protocol ID
SPI Size
Transform 1/4
Transform ID
Encryption algorithm
Key length
Hash algorithm
Authentication method
Group description
Life type
Life duration
Life type
Life duration
Transform 2/4
Transform ID
Encryption algorithm
Key length
Hash algorithm
Authentication method
Group description
Life type
Life duration
Life type
Life duration
Transform 3/4
Transform ID
: ISAKMP
: 0
: IKE
: Rijndael-cbc (aes)
: 128
: MD5
: Pre-Shared Key
: MODP 1024
: Seconds
: 43200
: Kilobytes
: 50000
: IKE
: Rijndael-cbc (aes)
: 128
: SHA
: Pre-Shared Key
: MODP 1024
: Seconds
: 43200
: Kilobytes
: 50000
: IKE
453
Chapter 9. VPN

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-2560Dfl-2560gDfl-260eDfl-860e

Table of Contents