从分支向总部发起,建立不起来,在R1总部端查看debugging ike all关键报错信息含义是什么
*Aug 9 11:23:44:715 2025 H3C IKE/7/EVENT: No pre-shared key found based on address 20.1.1.2.
*Aug 9 11:23:44:715 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Pre-shared key matching address 221.201.3.1 not found.
*Aug 9 11:23:44:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
No acceptable transform.
*Aug 9 11:23:44:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to parse the IKE SA payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Construct notification packet: NO_PROPOSAL_CHOSEN.
分部访问总部时在总部debugging ike all 的信息
完整的debugging信息
<H3C>terminal monitor
The current terminal is enabled to display logs.
<H3C>*Aug 9 11:22:53:528 2025 H3C IKE/7/EVENT: Received packet successfully.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received packet from 221.201.3.1 source port 2 destination port 500.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Aggressive
flags:
message ID: 0
length: 412
*Aug 9 11:22:53:528 2025 H3C IKE/7/EVENT: IKE thread 3062963152 processes a job.
*Aug 9 11:22:53:528 2025 H3C IKE/7/EVENT: Phase1 process started.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Begin a new phase 1 negotiation as responder.
*Aug 9 11:22:53:528 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Responder created an SA for peer 221.201.3.1, local port 500, remote port 2.
*Aug 9 11:22:53:528 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Set IKE SA state to IKE_P1_STATE_INIT.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Security Association Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Key Exchange Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Nonce Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Identification Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process ID payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID type: IPV4_ADDR (1).
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID value: address 20.1.1.2.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
The profile 1 is matched.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process SA payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Check ISAKMP transform 1.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Encryption algorithm is 3DES-CBC.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
HASH algorithm is HMAC-MD5.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
DH group is 5.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Authentication method is Pre-shared key.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Lifetime type is 1.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Life duration is 86400.
*Aug 9 11:22:53:528 2025 H3C IKE/7/EVENT: No pre-shared key found based on address 20.1.1.2.
*Aug 9 11:22:53:528 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Pre-shared key matching address 221.201.3.1 not found.
*Aug 9 11:22:53:528 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
No acceptable transform.
*Aug 9 11:22:53:528 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to parse the IKE SA payload.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Construct notification packet: NO_PROPOSAL_CHOSEN.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending packet to 221.201.3.1 remote port 2, local port 500.
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: NOTIFY
version: ISAKMP Version 1.0
exchange mode: Info
flags:
message ID: 0
length: 56
*Aug 9 11:22:53:528 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending an IPv4 packet.
*Aug 9 11:22:53:529 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sent data to socket successfully.
*Aug 9 11:22:53:529 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to negotiate IKE SA.
*Aug 9 11:22:58:714 2025 H3C IKE/7/EVENT: Received packet successfully.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received packet from 221.201.3.1 source port 2 destination port 500.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Aggressive
flags:
message ID: 0
length: 412
*Aug 9 11:22:58:715 2025 H3C IKE/7/EVENT: IKE thread 3062963152 processes a job.
*Aug 9 11:22:58:715 2025 H3C IKE/7/EVENT: Phase1 process started.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Begin a new phase 1 negotiation as responder.
*Aug 9 11:22:58:715 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Responder created an SA for peer 221.201.3.1, local port 500, remote port 2.
*Aug 9 11:22:58:715 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Set IKE SA state to IKE_P1_STATE_INIT.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Security Association Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Key Exchange Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Nonce Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Identification Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process ID payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID type: IPV4_ADDR (1).
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID value: address 20.1.1.2.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
The profile 1 is matched.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process SA payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Check ISAKMP transform 1.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Encryption algorithm is 3DES-CBC.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
HASH algorithm is HMAC-MD5.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
DH group is 5.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Authentication method is Pre-shared key.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Lifetime type is 1.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Life duration is 86400.
*Aug 9 11:22:58:715 2025 H3C IKE/7/EVENT: No pre-shared key found based on address 20.1.1.2.
*Aug 9 11:22:58:715 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Pre-shared key matching address 221.201.3.1 not found.
*Aug 9 11:22:58:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
No acceptable transform.
*Aug 9 11:22:58:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to parse the IKE SA payload.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Construct notification packet: NO_PROPOSAL_CHOSEN.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending packet to 221.201.3.1 remote port 2, local port 500.
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: NOTIFY
version: ISAKMP Version 1.0
exchange mode: Info
flags:
message ID: 0
length: 56
*Aug 9 11:22:58:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending an IPv4 packet.
*Aug 9 11:22:58:715 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sent data to socket successfully.
*Aug 9 11:22:58:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to negotiate IKE SA.
<H3C>*Aug 9 11:23:14:710 2025 H3C IKE/7/EVENT: Received packet successfully.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received packet from 221.201.3.1 source port 2 destination port 500.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Aggressive
flags:
message ID: 0
length: 412
*Aug 9 11:23:14:710 2025 H3C IKE/7/EVENT: IKE thread 3062963152 processes a job.
*Aug 9 11:23:14:710 2025 H3C IKE/7/EVENT: Phase1 process started.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Begin a new phase 1 negotiation as responder.
*Aug 9 11:23:14:710 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Responder created an SA for peer 221.201.3.1, local port 500, remote port 2.
*Aug 9 11:23:14:710 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Set IKE SA state to IKE_P1_STATE_INIT.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Security Association Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Key Exchange Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Nonce Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Identification Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process ID payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID type: IPV4_ADDR (1).
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID value: address 20.1.1.2.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
The profile 1 is matched.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process SA payload.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Check ISAKMP transform 1.
*Aug 9 11:23:14:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Encryption algorithm is 3DES-CBC.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
HASH algorithm is HMAC-MD5.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
DH group is 5.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Authentication method is Pre-shared key.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Lifetime type is 1.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Life duration is 86400.
*Aug 9 11:23:14:711 2025 H3C IKE/7/EVENT: No pre-shared key found based on address 20.1.1.2.
*Aug 9 11:23:14:711 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Pre-shared key matching address 221.201.3.1 not found.
*Aug 9 11:23:14:711 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
No acceptable transform.
*Aug 9 11:23:14:711 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to parse the IKE SA payload.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Construct notification packet: NO_PROPOSAL_CHOSEN.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending packet to 221.201.3.1 remote port 2, local port 500.
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: NOTIFY
version: ISAKMP Version 1.0
exchange mode: Info
flags:
message ID: 0
length: 56
*Aug 9 11:23:14:711 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending an IPv4 packet.
*Aug 9 11:23:14:711 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sent data to socket successfully.
*Aug 9 11:23:14:711 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to negotiate IKE SA.
<H3C>
<H3C>
<H3C>
<H3C>*Aug 9 11:23:26:709 2025 H3C IKE/7/EVENT: Received packet successfully.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received packet from 221.201.3.1 source port 2 destination port 500.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Aggressive
flags:
message ID: 0
length: 412
*Aug 9 11:23:26:709 2025 H3C IKE/7/EVENT: IKE thread 3062963152 processes a job.
*Aug 9 11:23:26:709 2025 H3C IKE/7/EVENT: Phase1 process started.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Begin a new phase 1 negotiation as responder.
*Aug 9 11:23:26:709 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Responder created an SA for peer 221.201.3.1, local port 500, remote port 2.
*Aug 9 11:23:26:709 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Set IKE SA state to IKE_P1_STATE_INIT.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Security Association Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Key Exchange Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Nonce Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Identification Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process ID payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID type: IPV4_ADDR (1).
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID value: address 20.1.1.2.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
The profile 1 is matched.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process SA payload.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Check ISAKMP transform 1.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Encryption algorithm is 3DES-CBC.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
HASH algorithm is HMAC-MD5.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
DH group is 5.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Authentication method is Pre-shared key.
*Aug 9 11:23:26:709 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Lifetime type is 1.
*Aug 9 11:23:26:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Life duration is 86400.
*Aug 9 11:23:26:710 2025 H3C IKE/7/EVENT: No pre-shared key found based on address 20.1.1.2.
*Aug 9 11:23:26:710 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Pre-shared key matching address 221.201.3.1 not found.
*Aug 9 11:23:26:710 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
No acceptable transform.
*Aug 9 11:23:26:710 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to parse the IKE SA payload.
*Aug 9 11:23:26:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Construct notification packet: NO_PROPOSAL_CHOSEN.
*Aug 9 11:23:26:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending packet to 221.201.3.1 remote port 2, local port 500.
*Aug 9 11:23:26:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: NOTIFY
version: ISAKMP Version 1.0
exchange mode: Info
flags:
message ID: 0
length: 56
*Aug 9 11:23:26:710 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending an IPv4 packet.
*Aug 9 11:23:26:710 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sent data to socket successfully.
*Aug 9 11:23:26:710 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to negotiate IKE SA.
<H3C>
<H3C>
<H3C>
<H3C>
<H3C>dis ike sa
Connection-ID Local Remote Flag DOI
-------------------------------------------------------------------------
<H3C>*Aug 9 11:23:44:714 2025 H3C IKE/7/EVENT: Received packet successfully.
*Aug 9 11:23:44:714 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received packet from 221.201.3.1 source port 2 destination port 500.
*Aug 9 11:23:44:714 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: SA
version: ISAKMP Version 1.0
exchange mode: Aggressive
flags:
message ID: 0
length: 412
*Aug 9 11:23:44:714 2025 H3C IKE/7/EVENT: IKE thread 3062963152 processes a job.
*Aug 9 11:23:44:714 2025 H3C IKE/7/EVENT: Phase1 process started.
*Aug 9 11:23:44:714 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Begin a new phase 1 negotiation as responder.
*Aug 9 11:23:44:714 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Responder created an SA for peer 221.201.3.1, local port 500, remote port 2.
*Aug 9 11:23:44:714 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Set IKE SA state to IKE_P1_STATE_INIT.
*Aug 9 11:23:44:714 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Security Association Payload.
*Aug 9 11:23:44:714 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Key Exchange Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Nonce Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Identification Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Received ISAKMP Vendor ID Payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process ID payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID type: IPV4_ADDR (1).
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Peer ID value: address 20.1.1.2.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
The profile 1 is matched.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Process SA payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Check ISAKMP transform 1.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Encryption algorithm is 3DES-CBC.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
HASH algorithm is HMAC-MD5.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
DH group is 5.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Authentication method is Pre-shared key.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Lifetime type is 1.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Life duration is 86400.
*Aug 9 11:23:44:715 2025 H3C IKE/7/EVENT: No pre-shared key found based on address 20.1.1.2.
*Aug 9 11:23:44:715 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Pre-shared key matching address 221.201.3.1 not found.
*Aug 9 11:23:44:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
No acceptable transform.
*Aug 9 11:23:44:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to parse the IKE SA payload.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Construct notification packet: NO_PROPOSAL_CHOSEN.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending packet to 221.201.3.1 remote port 2, local port 500.
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
I-COOKIE: 17cb312c607bac1b
R-COOKIE: 0000000000000000
next payload: NOTIFY
version: ISAKMP Version 1.0
exchange mode: Info
flags:
message ID: 0
length: 56
*Aug 9 11:23:44:715 2025 H3C IKE/7/PACKET: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sending an IPv4 packet.
*Aug 9 11:23:44:715 2025 H3C IKE/7/EVENT: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Sent data to socket successfully.
*Aug 9 11:23:44:715 2025 H3C IKE/7/ERROR: vrf = 0, local = 111.33.1.2, remote = 221.201.3.1/2
Failed to negotiate IKE SA.
<H3C>
<H3C>u tm
The recycle-bin is empty.
<H3C>u t m
The current terminal is disabled to display logs.
<H3C>
(0)
打个400或联系购买渠道由专业工程师协助下吧
目前信息
1、配置不全判断不了
2、debug看协商密钥未匹配
3、信息都不全,没法分析。大概率还是配置问题可能性较大
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论