• 全部
  • 经验案例
  • 典型配置
  • 技术公告
  • FAQ
  • 漏洞说明
  • 全部
  • 全部
  • 大数据引擎
  • 知了引擎
产品线
搜索
取消
案例类型
发布者
是否解决
是否官方
时间
搜索引擎
匹配模式
高级搜索

MSR36-40 同一端口建立多个IPSEC隧道

2025-04-02提问
  • 0关注
  • 0收藏,430浏览
粉丝:0人 关注:0人

问题描述:

 

 

组网及组网描述:

 

要求在 R1 和 R2、R3....之间建立多个 IPsec 隧道,对 PC6所在的子网(192.168.110.0/24)与其他PC所在的子网(192.168.120.X/32)之间的数据流进行安全保护。

现在的思路是使用ipsec policy-template的方法。 

进展是:R1和R2之间的IPSEC的SA协商没有通过。请帮忙看看,谢谢!

配置如下

R1

int gig 0/0
ip addr 2.2.2.1 24
quit

int gig 0/1
ip addr 192.168.110.1 24
quit

acl advanced 3101
rule 0 permit ip source 192.168.110.0 0.0.0.255 destination 192.168.120.0 0.0.0.255
quit

ipsec transform-set tran1
encapsulation-mode tunnel
protocol esp
esp encryption-algorithm 3des
esp authentication-algorithm sha1
quit

ikev2 keychain keychain1
peer ENB
address 0.0.0.0 0.0.0.0
identity fqdn branch
pre-shared-key plaintext 123456
quit
quit

ikev2 profile profile1
keychain keychain1
match remote identity fqdn branch
authentication-method local pre-share
authentication-method remote pre-share
quit


ipsec policy-template template1 1
remote-address 2.2.2.2
security acl 3101
transform-set transform1
ikev2-profile profile1
quit

ipsec policy policy1 1 isakmp template template1
ikev2 address-group template1 2.2.2.2 2.2.2.10 255.255.255.255

##
int gig 0/0
ipsec apply policy policy1
quit

ip route-static 192.168.120.0 255.255.255.0  2.2.2.2
-------------------------------------------------------
R2

int gig 0/0
ip addr 2.2.2.2 24
quit

int gig 0/1
ip addr 192.168.120.1 24
quit

acl advanced 3101
rule 0 permit ip source 192.168.120.0 0.0.0.255 destination 192.168.110.0 0.0.0.255
quit

ipsec transform-set tran1
encapsulation-mode tunnel
protocol esp
esp encryption-algorithm 3des
esp authentication-algorithm sha1
quit

ikev2 keychain keychain1
peer ENB
address 2.2.2.1 24
identity address 2.2.2.1
pre-shared-key plaintext 123456
quit
quit

ikev2 profile profile1
identity local fqdn branch
authentication-method local pre-share
authentication-method remote pre-share
keychain keychain1
match remote identity address 2.2.2.1 255.255.255.0
quit


ipsec policy use1 10 isakmp
local-address 2.2.2.2
remote-address 2.2.2.1
security acl 3101
transform-set tran1
ikev2-profile profile1
quit

int gig 0/0
ipsec apply policy use1
quit

ip route-static 192.168.110.0 255.255.255.0  2.2.2.1
 

 

2 个回答
粉丝:32人 关注:1人

keychain 里面的地址配置有问题吧,不要写子网掩码啊

谢谢

别问Chris 发表时间:2025-04-03 更多>>

去掉子网掩码后,还是没有建立起来。下面是debug输出,谢谢

别问Chris 发表时间:2025-04-03
回复别问Chris:

你这个第一阶段已经成功了display ike sa看一下

zhiliao_v6hOyc 发表时间:2025-04-03
回复别问Chris:

display ipsec sa

zhiliao_v6hOyc 发表时间:2025-04-03

都是空的

别问Chris 发表时间:2025-04-03
回复别问Chris:

你这个场景也可以直接用野蛮模式对接的,不一定要用模板

zhiliao_v6hOyc 发表时间:2025-04-03

能贴个demo吗,我改改试试

别问Chris 发表时间:2025-04-03
回复别问Chris:

https://zhiliao.h3c.com/Theme/details/45588

zhiliao_v6hOyc 发表时间:2025-04-03

谢谢

别问Chris 发表时间:2025-04-03
别问Chris 知了小白
粉丝:0人 关注:0人

 (Tunnel ID 22): IKE SA deleted.
undo terminal debugging*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Received packet from 2.2.2.2 source port 500 destination port 500.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500

I-SPI: 9d0d025d6c23ac37
R-SPI: 0000000000000000
Message ID: 0
Exchange type: SA_INIT
Flags: REQUEST, INITIATOR
Next payload: SA, Length: 400.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
(Tunnel ID 23): (R) Current State: IDLE.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Payload contents:
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
SA Next payload: KE, Length: 80.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last proposal: 0, Length: 76.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Proposal: 1, Protocol: IKE, SPI size: 0, Transform number: 8.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 12.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: ENCR, Transform ID: AES-CBC.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Key length: 128.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: ENCR, Transform ID: 3DES-CBC.
*Apr 3 03:00:35:467 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: INTEG, Transform ID: AUTH-HMAC-SHA1-96.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: INTEG, Transform ID: AUTH-HMAC-MD5-96.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: PRF, Transform ID: PRF-HMAC-SHA1.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: PRF, Transform ID: PRF-HMAC-MD5.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: D-H, Transform ID: 1536-bit MODP/Group 5.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0, Length: 8.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: D-H, Transform ID: 1024-bit MODP/Group 2.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
KE Next payload: NONCE, Length: 200, DH: 1536-bit MODP/Group 5.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NONCE Next payload: NOTIFY, Length: 36.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: NOTIFY, Length: 28, Type: NAT_DETECTION_SOURCE_IP, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: NO_PAYLOAD, Length: 28, Type: NAT_DETECTION_DESTINATION_IP, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Request has message id 0, expected from (0 ~ 0).
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Search policy with vrf 0, local address 2.2.2.1.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Found default policy to use.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Process SA payload.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Process KE payload.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Process NAT discovery notify.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
No NAT found.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
(Tunnel ID 23): (R) Current State: PROC_INIT.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Search policy with vrf 0, local address 2.2.2.1.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Found default policy to use.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Construct SA payload.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Proposal 1.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Transform ENCR AES-CBC 128.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Transform INTEG AUTH-HMAC-SHA1-96.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Transform PRF PRF-HMAC-SHA1.
*Apr 3 03:00:35:468 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Transform D-H 1536-bit MODP/Group 5.
*Apr 3 03:00:35:487 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Compute DH public key, use 1536-bit MODP/Group 5.
*Apr 3 03:00:35:487 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Construct KE payload.
*Apr 3 03:00:35:487 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Construct NONCE payload.
*Apr 3 03:00:35:487 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Construct NOTIFY payload: NAT_DETECTION_SOURCE_IP.
*Apr 3 03:00:35:487 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Construct NOTIFY payload: NAT_DETECTION_DESTINATION_IP.
*Apr 3 03:00:35:487 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Construct CERTREQ payload.
*Apr 3 03:00:35:487 2025 H3C IKEV2/7/ERROR: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Construct CERTREQ payload failed.
*Apr 3 03:00:35:504 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Calculate SKEYSEED.
*Apr 3 03:00:35:505 2025 H3C IKEV2/7/TIMER: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Responder: start 30 secs wait auth timer.
*Apr 3 03:00:35:505 2025 H3C IKEV2/7/FSM: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
(Tunnel ID 23): (R) Current State: BUILD_INIT.
*Apr 3 03:00:35:505 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Payload contents:
*Apr 3 03:00:35:505 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
SA Next payload: KE, Length: 48.
*Apr 3 03:00:35:505 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last proposal: 0, Length: 44.
*Apr 3 03:00:35:505 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Proposal: 1, Protocol: IKE, SPI size: 0, Transform number: 4.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 12.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: ENCR, Transform ID: AES-CBC.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Key length: 128.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: INTEG, Transform ID: AUTH-HMAC-SHA1-96.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: PRF, Transform ID: PRF-HMAC-SHA1.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0, Length: 8.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: D-H, Transform ID: 1536-bit MODP/Group 5.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
KE Next payload: NONCE, Length: 200, DH: 1536-bit MODP/Group 5.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NONCE Next payload: NOTIFY, Length: 36.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: NOTIFY, Length: 28, Type: NAT_DETECTION_SOURCE_IP, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: NO_PAYLOAD, Length: 28, Type: NAT_DETECTION_DESTINATION_IP, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Sending packet to 2.2.2.2 remote port 500, local port 500.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500

I-SPI: 9d0d025d6c23ac37
R-SPI: c21376a2d67e8df7
Message ID: 0
Exchange type: SA_INIT
Flags: RESPONSE
Next payload: SA, Length: 368.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Sending an IPv4 packet.
*Apr 3 03:00:35:506 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Sent response with message id 0, requests can be accepted from (1 ~ 1).
*Apr 3 03:00:35:525 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Received packet from 2.2.2.2 source port 500 destination port 500.
*Apr 3 03:00:35:525 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500

I-SPI: 9d0d025d6c23ac37
R-SPI: c21376a2d67e8df7
Message ID: 1
Exchange type: AUTH
Flags: REQUEST, INITIATOR
Next payload: ENCRYPTED, Length: 268.
*Apr 3 03:00:35:525 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Payload contents:
*Apr 3 03:00:35:525 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Parse the last payload (ENCRYPTED payload).
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Integrity check passed.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
IDi Next payload: NOTIFY, Length: 14, Type: ID_FQDN.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: AUTH, Length: 8, Type: INITIAL_CONTACT, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
AUTH Next payload: NOTIFY, Length: 28, Method: Pre-shared key.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: NOTIFY, Length: 8, Type: ESP_TFC_PADDING_NOT_SUPPORTED, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: NOTIFY, Length: 8, Type: NON_FIRST_FRAGMENTS_ALSO, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
NOTIFY Next payload: SA, Length: 8, Type: IKEV2_MESSAGE_ID_SYNC_SUPPORTED, Protocol: NO PROTOCOL, SPI size: 0.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
SA Next payload: TSi, Length: 40.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last proposal: 0, Length: 36.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Proposal: 1, Protocol: ESP, SPI size: 4, Transform number: 3.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:526 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: INTEG, Transform ID: AUTH-HMAC-SHA1-96.
*Apr 3 03:00:35:527 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Last transform: 0x3, Length: 8.
*Apr 3 03:00:35:527 2025 H3C IKEV2/7/PACKET: vrf = 0, src = 2.2.2.1, dst = 2.2.2.2/500
Type: ENCR, Transform ID: 3DES-CBC.

编辑答案

你正在编辑答案

如果你要对问题或其他回答进行点评或询问,请使用评论功能。

分享扩散:

提出建议

    +

亲~登录后才可以操作哦!

确定

亲~检测到您登陆的账号未在http://hclhub.h3c.com进行注册

注册后可访问此模块

跳转hclhub

你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作

举报

×

侵犯我的权益 >
对根叔社区有害的内容 >
辱骂、歧视、挑衅等(不友善)

侵犯我的权益

×

泄露了我的隐私 >
侵犯了我企业的权益 >
抄袭了我的内容 >
诽谤我 >
辱骂、歧视、挑衅等(不友善)
骚扰我

泄露了我的隐私

×

您好,当您发现根叔知了上有泄漏您隐私的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您认为哪些内容泄露了您的隐私?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)

侵犯了我企业的权益

×

您好,当您发现根叔知了上有关于您企业的造谣与诽谤、商业侵权等内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到 pub.zhiliao@h3c.com 邮箱,我们会在审核后尽快给您答复。
  • 1. 您举报的内容是什么?(请在邮件中列出您举报的内容和链接地址)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
  • 3. 是哪家企业?(营业执照,单位登记证明等证件)
  • 4. 您与该企业的关系是?(您是企业法人或被授权人,需提供企业委托授权书)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

抄袭了我的内容

×

原文链接或出处

诽谤我

×

您好,当您发现根叔知了上有诽谤您的内容时,您可以向根叔知了进行举报。 请您把以下内容通过邮件发送到pub.zhiliao@h3c.com 邮箱,我们会尽快处理。
  • 1. 您举报的内容以及侵犯了您什么权益?(请在邮件中列出您举报的内容、链接地址,并给出简短的说明)
  • 2. 您是谁?(身份证明材料,可以是身份证或护照等证件)
我们认为知名企业应该坦然接受公众讨论,对于答案中不准确的部分,我们欢迎您以正式或非正式身份在根叔知了上进行澄清。

对根叔社区有害的内容

×

垃圾广告信息
色情、暴力、血腥等违反法律法规的内容
政治敏感
不规范转载 >
辱骂、歧视、挑衅等(不友善)
骚扰我
诱导投票

不规范转载

×

举报说明