Download Print this page

Cisco SRP500 Configuration Manual page 7

Small business managed router feature site to site ipsec vpns

Advertisement

ISAKMP:(2026): processing ID payload. message ID = 0
ISAKMP (2026): ID payload
next-payload : 8
type
address
protocol
port
length
ISAKMP:(0):: peer matches *none* of the profiles
ISAKMP:(2026): processing HASH payload. message ID = 0
ISAKMP:(2026):SA authentication status:
authenticated
ISAKMP:(2026):SA has been authenticated with 192.168.200.162
ISAKMP: Trying to insert a peer 192.168.200.146/192.168.200.162/500/,
successfully 83952688.
ISAKMP:(2026):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
ISAKMP:(2026):Old State = IKE_R_MM5
ISAKMP:(2026):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
ISAKMP (2026): ID payload
next-payload : 8
type
address
protocol
port
length
ISAKMP:(2026):Total payload length: 12
ISAKMP:(2026): sending packet to 192.168.200.162 my_port 500 peer_port 500 (R)
MM_KEY_EXCH
ISAKMP:(2026):Sending an IKE IPv4 Packet.
ISAKMP:(2026):Returning Actual lifetime: 28800
ISAKMP: set new node 1956323662 to QM_IDLE
ISAKMP:(2026):Sending NOTIFY RESPONDER_LIFETIME protocol 1
spi 2227348128, message ID = 1956323662
ISAKMP:(2026): sending packet to 192.168.200.162 my_port 500 peer_port 500 (R)
MM_KEY_EXCH
ISAKMP:(2026):Sending an IKE IPv4 Packet.
ISAKMP:(2026):purging node 1956323662
ISAKMP: Sending phase 1 responder lifetime 28800
ISAKMP:(2026):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
ISAKMP:(2026):Old State = IKE_R_MM5
ISAKMP:(2026):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
ISAKMP:(2026):Old State = IKE_P1_COMPLETE
ISAKMP (2026): received packet from 192.168.200.162 dport 500 sport 500 Global (R)
QM_IDLE
ISAKMP: set new node 1985749619 to QM_IDLE
ISAKMP:(2026): processing HASH payload. message ID = 1985749619
ISAKMP:(2026): processing SA payload. message ID = 1985749619
ISAKMP:(2026):Checking IPSec proposal 0
ISAKMP: transform 0, ESP_3DES
ISAKMP:
attributes in transform:
ISAKMP:
group is 2
ISAKMP:
encaps is 1 (Tunnel)
ISAKMP:
SA life type in seconds
ISAKMP:
SA life duration (basic) of 7800
ISAKMP:
authenticator is HMAC-SHA
ISAKMP:(2026):atts are acceptable.
IPSEC(validate_proposal_request): proposal part #1
IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 192.168.200.146, remote= 192.168.200.162,
local_proxy= 192.168.9.0/255.255.255.0/0/0 (type=4),
remote_proxy= 192.168.15.0/255.255.255.0/0/0 (type=4),
protocol= ESP, transform= NONE
lifedur= 0s and 0kb,
All contents are Copyright © 1992-2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
: 1
: 192.168.200.162
: 0
: 0
: 12
New State = IKE_R_MM5
: 1
: 192.168.200.146
: 17
: 500
: 12
New State = IKE_P1_COMPLETE
(Tunnel),
New State = IKE_P1_COMPLETE
and inserted
Page 7 of 9

Advertisement

loading