VPN BAOCUO
*Jan 1 02:52:29:504 2011 H3C IKE/7/EVENT: Received message from ipsec. *Jan 1 02:52:29:504 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:504 2011 H3C IKE/7/EVENT: IKE thread 1091126560 processes a job. *Jan 1 02:52:29:504 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:504 2011 H3C IKE/7/EVENT: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jan 1 02:52:29:507 2011 H3C IKE/7/EVENT: Received message from ipsec. *Jan 1 02:52:29:507 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:507 2011 H3C IKE/7/EVENT: IKE thread 1091126560 processes a job. *Jan 1 02:52:29:507 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:507 2011 H3C IKE/7/EVENT: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jan 1 02:52:29:510 2011 H3C IKE/7/EVENT: Received message from ipsec. *Jan 1 02:52:29:510 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:510 2011 H3C IKE/7/EVENT: IKE thread 1091126560 processes a job. *Jan 1 02:52:29:510 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:510 2011 H3C IKE/7/EVENT: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jan 1 02:52:29:512 2011 H3C IKE/7/EVENT: Received message from ipsec. *Jan 1 02:52:29:512 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:512 2011 H3C IKE/7/EVENT: IKE thread 1091126560 processes a job. *Jan 1 02:52:29:512 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:513 2011 H3C IKE/7/EVENT: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jan 1 02:52:29:756 2011 H3C IKE/7/EVENT: Received message from ipsec. *Jan 1 02:52:29:756 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:756 2011 H3C IKE/7/EVENT: IKE thread 1091126560 processes a job. *Jan 1 02:52:29:756 2011 H3C IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 02:52:29:756 2011 H3C IKE/7/EVENT: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jan 1 02:52:29:833 2011 H3C IKE/7/EVENT: Received packet successfully.
*Jan 1 02:52:46:259 2011 H3C IKE/7/PACKET: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Retransmit phase 1 packet. *Jan 1 02:52:46:259 2011 H3C IKE/7/PACKET: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Sending packet to 180.168.123.70 remote port 500, local port 500. *Jan 1 02:52:46:259 2011 H3C IKE/7/PACKET: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 I-COOKIE: dadb5e13b773dcc1 R-COOKIE: 0000000000000000 next payload: SA version: ISAKMP Version 1.0 exchange mode: Main flags: message ID: 0 length: 208 *Jan 1 02:52:46:259 2011 H3C IKE/7/PACKET: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Sending an IPv4 packet. *Jan 1 02:52:46:259 2011 H3C IKE/7/EVENT: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Sent data to socket successfully. *Jan 1 02:52:47:510 2011 H3C IKE/7/EVENT: Received packet successfully.
(0)
最佳答案
您好,请知:
Jan 1 02:52:46:259 2011 H3C IKE/7/EVENT: vrf = 0, src = 111.160.227.118, dst = 180.168.123.70/500 Sent data to socket successfully. *Jan 1 02:52:47:510 2011 H3C IKE/7/EVENT: Received packet successfully.
根据提取的日志来看是发送和接受数据成功的。
具体检查下IPSEC VPN的配置和隧道是否已建立完成。
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论