• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

MSR810

2018-03-12提问
  • 0关注
  • 1收藏,2591浏览
粉丝:4人 关注:0人

问题描述:

ipsec在出口断开再连之后不能建立vpn。以下是debug ike的信息


<810>ping -a 192.168.0.1 192.168.10.1
Ping 192.168.10.1 (192.168.10.1) from 192.168.0.1: 56 data bytes, press CTRL_C to break
Request time out
*Jan  2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan  2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500

  I-COOKIE: f05c584ab1fa05b1
  R-COOKIE: 50947167fb7115e1
  next payload: HASH
  version: ISAKMP Version 1.0
  exchange mode: Quick
  flags: ENCRYPT
  message ID: c7f637b
  length: 300
*Jan  2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:46:55:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
Request time out
Request time out
*Jan  2 04:47:00:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:00:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:00:131 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
*Jan  2 04:47:01:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:01:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:01:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out

--- Ping statistics for 192.168.10.1 ---
5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
<810>%Jan  2 04:47:02:016 2011 810 PING/6/PING_STATISTICS: Ping statistics for 192.168.10.1: 5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.
*Jan  2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan  2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500

  I-COOKIE: f05c584ab1fa05b1
  R-COOKIE: 50947167fb7115e1
  next payload: HASH
  version: ISAKMP Version 1.0
  exchange mode: Quick
  flags: ENCRYPT
  message ID: a0f35038
  length: 300
*Jan  2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:05:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.

<810>ping -a 192.168.0.1 192.168.10.1*Jan  2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan  2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan  2 04:47:06:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sent data to socket successfully.
*Jan  2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan  2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan  2 04:47:06:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sent data to socket successfully.
ping -a 192.168.0.1 192.168.169.1
Ping 192.168.169.1 (192.168.169.1) from 192.168.0.1: 56 data bytes, press CTRL_C to break
*Jan  2 04:47:13:131 2011 810 IKE/7/ERROR: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmission of  phase 2 packet timed out.
*Jan  2 04:47:13:131 2011 810 IKE/7/ERROR: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Failed to negotiate IPsec SA.
*Jan  2 04:47:13:131 2011 810 IKE/7/EVENT: Delete IPsec SA.
Request time out
*Jan  2 04:47:14:103 2011 810 IKE/7/EVENT: Received message from ipsec, message type is 0.
*Jan  2 04:47:14:104 2011 810 IKE/7/EVENT: Received SA acquire message from IPsec.
*Jan  2 04:47:14:104 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job.
*Jan  2 04:47:14:104 2011 810 IKE/7/EVENT: Received SA acquire message from IPsec.
*Jan  2 04:47:14:105 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/500
Set IPsec SA state to IKE_P2_STATE_INIT.
*Jan  2 04:47:14:105 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job.
*Jan  2 04:47:14:106 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Begin Quick mode exchange.
*Jan  2 04:47:14:106 2011 810 IKE/7/EVENT: Received message from ipsec, message type is 9.
*Jan  2 04:47:14:107 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
IPsec SA state changed from IKE_P2_STATE_INIT to IKE_P2_STATE_GETSPI.
*Jan  2 04:47:14:107 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job.
*Jan  2 04:47:14:107 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Set attributes according to phase 2 transform.
*Jan  2 04:47:14:107 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  Encapsulation mode is Tunnel-UDP.
*Jan  2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  in seconds
*Jan  2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  Life duration is 3600.
*Jan  2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  in kilobytes
*Jan  2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  Life duration is 1843200.
*Jan  2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  DH group 2.
*Jan  2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  Authentication algorithm is HMAC-MD5.
*Jan  2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  Key length is 256 bytes.
*Jan  2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
  Transform ID is AES-CBC.
*Jan  2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct transform 1.
*Jan  2 04:47:14:110 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec proposal 1.
*Jan  2 04:47:14:110 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec SA payload.
*Jan  2 04:47:14:110 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct NONCE payload.
*Jan  2 04:47:14:174 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct KE payload.
*Jan  2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec ID payload.
*Jan  2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec ID payload.
*Jan  2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct HASH(1) payload.
*Jan  2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Encrypt the packet.
*Jan  2 04:47:14:175 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
IPsec SA state changed from IKE_P2_STATE_GETSPI to IKE_P2_STATE_SEND1.
*Jan  2 04:47:14:176 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:14:176 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500

  I-COOKIE: f05c584ab1fa05b1
  R-COOKIE: 50947167fb7115e1
  next payload: HASH
  version: ISAKMP Version 1.0
  exchange mode: Quick
  flags: ENCRYPT
  message ID: c645e6c8
  length: 300
*Jan  2 04:47:14:176 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:14:176 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
Request time out
*Jan  2 04:47:20:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:20:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:20:131 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
*Jan  2 04:47:20:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan  2 04:47:20:132 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:20:132 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500

  I-COOKIE: f05c584ab1fa05b1
  R-COOKIE: 50947167fb7115e1
  next payload: HASH
  version: ISAKMP Version 1.0
  exchange mode: Quick
  flags: ENCRYPT
  message ID: c645e6c8
  length: 300
*Jan  2 04:47:20:132 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:20:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
*Jan  2 04:47:21:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:21:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:21:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out

--- Ping statistics for 192.168.169.1 ---
5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
<810>%Jan  2 04:47:22:917 2011 810 PING/6/PING_STATISTICS: Ping statistics for 192.168.169.1: 5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.
*Jan  2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan  2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500

  I-COOKIE: f05c584ab1fa05b1
  R-COOKIE: 50947167fb7115e1
  next payload: HASH
  version: ISAKMP Version 1.0
  exchange mode: Quick
  flags: ENCRYPT
  message ID: a0f35038
  length: 300
*Jan  2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:23:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
*Jan  2 04:47:26:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan  2 04:47:26:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan  2 04:47:26:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sent data to socket successfully.
*Jan  2 04:47:26:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan  2 04:47:26:132 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan  2 04:47:26:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sent data to socket successfully.
*Jan  2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan  2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan  2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500

  I-COOKIE: f05c584ab1fa05b1
  R-COOKIE: 50947167fb7115e1
  next payload: HASH
  version: ISAKMP Version 1.0
  exchange mode: Quick
  flags: ENCRYPT
  message ID: c645e6c8
  length: 300
*Jan  2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan  2 04:47:29:131 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.

最佳答案

ZHQD 四段
粉丝:0人 关注:1人

两边配上dpd吧


需要配置上什么发一下么? ike dpd interval 10 on-demand是这个么?还有这个设备是一个分支来的。

我有一本苏 发表时间:2018-03-12
1 个回答
粉丝:24人 关注:1人

reset ipsec和ike的sa,再触发重新debug一下看看

*Jan 2 04:59:25:024 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job. *Jan 2 04:59:25:025 2011 810 IKE/7/EVENT: Info packet process started. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Decrypt the packet. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Received ISAKMP Hash Payload. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Received ISAKMP Notification Payload. *Jan 2 04:59:25:026 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Parse informational exchange packet successfully. *Jan 2 04:59:25:026 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Notification INVALID_ID_INFORMATION is received. *Jan 2 04:59:25:026 2011 810 IKE/7/EVENT: Delete IPsec SA.

我有一本苏 发表时间:2018-03-12

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明