问题:IPSec VPN不稳定
组网及设备信息如下参考“组网”
配置:
启用IPSec VPN,北京作为中心端,武汉作为客户端
北京:野蛮模式,NAME,***.***,流量触发
武汉:野蛮模式,NAME,***.***,长连模式
现象:
武汉在IP变化后,VPN连接会断掉,两个小时都建立不起新的连接来,只有北京的VPN服务重启之后才能建立起来
日志:
北京:
2019-12-27 14:00:51 | informational | VPN | 安全策略[policy_wh_1]: IPSEC SA建立完成 tunnel mode {ESP 出SPI=0xa76eebb8 入SPI=0xbc90fdc3 加密算法=AES_128 认证算法=HMAC_SHA1 NATOA=none NATD=119.98.218.88:4500 DPD=关闭 PFS=禁止}. | |
2019-12-27 14:00:48 | debug | VPN | 安全策略[policy_wh_2]: 发送PAYLOAD_MALFORMED通告信息到119.98.218.88:4500. | |
2019-12-27 14:00:48 | informational | VPN | 安全策略[policy_wh_2]: IPSEC SA建立完成 tunnel mode {ESP 出SPI=0xa76eebb7 入SPI=0xbc90fdc2 加密算法=AES_128 认证算法=HMAC_SHA1 NATOA=none NATD=119.98.218.88:4500 DPD=关闭 PFS=禁止}. | |
2019-12-27 14:00:37 | debug | VPN | 安全策略[policy_wh_1]: 发起IPSEC SA协商. | |
2019-12-27 14:00:34 | debug | VPN | 192.168.1.7<->119.98.218.88[policy_wh_2]: 收到119.98.218.88的IPSEC SA协商请求. | |
2019-12-27 14:00:34 | informational | VPN | 192.168.1.7<->119.98.218.88[policy_wh_2]: ISAKMP SA建立完成 {加密算法=aes_128 认证算法=oakley_sha DH组=DH14(modp2048)}. | |
2019-12-27 14:00:34 | debug | VPN | 192.168.1.7<->119.98.218.88[policy_wh_2]: 收到119.98.218.88的ISAKMP野蛮模式协商请求. | |
2019-12-27 14:00:32 | debug | VPN | 安全策略[policy_wh_1]: 查询DNS名称成功,对端***.***的IP地址是119.98.218.88. | |
2019-12-27 14:00:32 | debug | VPN | 安全策略[policy_wh_2]: 查询DNS名称成功,对端***.***的IP地址是119.98.218.88. | |
2019-12-27 13:59:39 | informational | 配置 | IPSEC VPN功能开启。 | |
2019-12-27 13:59:36 | informational | 配置 | IPSEC VPN功能关闭。 | |
2019-12-27 13:59:15 | informational | 系统 | 用户admin从192.168.10.76登录。 | |
2019-12-27 13:59:15 | notice | 系统 | 用户admin(192.168.10.76)超时。 | |
2019-12-27 12:11:09 | debug | VPN | 安全策略[policy_wh_2]: 删除IPSEC SA(SPI=0xd1ca0ade). | |
2019-12-27 12:11:09 | debug | VPN | 192.168.1.7<->219.140.142.175[policy_wh_2]: 收到219.140.142.175的IPSEC SA协商请求. | |
2019-12-27 12:11:09 | debug | VPN | 安全策略[policy_wh_2]: 删除IPSEC SA(SPI=0xd1ca0adc). | |
2019-12-27 12:11:09 | debug | VPN | 安全策略[policy_wh_2]: 删除IPSEC SA(SPI=0xa76eebb3). | |
2019-12-27 12:11:09 | debug | VPN | 安全策略[policy_wh_2]: 删除IPSEC SA(SPI=0xa76eebb5). | |
2019-12-27 12:10:59 | informational | VPN | 安全策略[policy_wh_2]: IPSEC SA建立完成 tunnel mode {ESP 出SPI=0xa76eebb5 入SPI=0xd1ca0ade 加密算法=AES_128 认证算法=HMAC_SHA1 NATOA=none NATD=119.98.218.88:4500 DPD=关闭 PFS=禁止}. | |
2019-12-27 12:10:59 | debug | VPN | 192.168.1.7<->219.140.142.175[policy_wh_2]: 收到219.140.142.175的IPSEC SA协商请求. | |
2019-12-27 12:10:59 | informational | VPN | 192.168.1.7<->219.140.142.175[policy_wh_2]: ISAKMP SA建立完成 {加密算法=aes_128 认证算法=oakley_sha DH组=DH14(modp2048)}. | |
2019-12-27 12:10:57 | debug | VPN | 192.168.1.7<->219.140.142.175[policy_wh_2]: 发送PAYLOAD_MALFORMED通告信息到219.140.142.175:500. | |
2019-12-27 12:10:57 | debug | VPN | 192.168.1.7<->219.140.142.175[policy_wh_2]: 收到219.140.142.175的ISAKMP野蛮模式协商请求. | |
2019-12-27 12:10:55 | debug | VPN | 安全策略[policy_wh_1]: 删除IPSEC SA(SPI=0xd1ca0add). | |
2019-12-27 12:10:55 | debug | VPN | 安全策略[policy_wh_1]: 删除IPSEC SA(SPI=0xa76eebb4). | |
2019-12-27 12:10:55 | debug | VPN | 安全策略[policy_wh_1]: 查询DNS名称成功,对端***.***的IP地址是119.98.218.88. | |
2019-12-27 12:10:55 | debug | VPN | 安全策略[policy_wh_2]: 查询DNS名称成功,对端***.***的IP地址是219.140.142.175. | |
2019-12-27 12:10:23 | debug | VPN | 安全策略[policy_wh_2]: 查询DNS名称成功,对端***.***的IP地址是219.140.142.175. | |
2019-12-27 12:10:23 | debug | VPN | 安全策略[policy_wh_1]: 查询DNS名称成功,对端***.***的IP地址是219.140.142.175. | |
2019-12-27 12:10:07 | debug | VPN | packet from 119.98.218.88:500: 收到未知对端119.98.218.88的ISAKMP野蛮模式协商请求. | |
2019-12-27 12:09:59 | debug | VPN | packet from 119.98.218.88:500: 收到未知对端119.98.218.88的ISAKMP野蛮模式协商请求. | |
2019-12-27 12:09:55 | debug | VPN | packet from 119.98.218.88:500: 收到未知对端119.98.218.88的ISAKMP野蛮模式协商请求. | |
2019-12-27 12:09:53 | debug | VPN | 安全策略[policy_wh_1]: 查询DNS名称成功,对端***.***的IP地址是219.140.142.175. | |
2019-12-27 12:09:53 | debug | VPN | 安全策略[policy_wh_2]: 查询DNS名称成功,对端***.***的IP地址是219.140.142.175. | |
武汉:
2019-12-27 14:00:51 | informational | VPN | 安全策略[policy_bj_1]: IPSEC SA建立完成 tunnel mode {ESP 出SPI=0xbc90fdc3 入SPI=0xa76eebb8 加密算法=AES_128 认证算法=HMAC_SHA1 NATOA=none NATD=221.216.210.2:4500 DPD=关闭 PFS=禁止}. | |
2019-12-27 14:00:50 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 收到221.216.210.2的IPSEC SA协商请求. | |
2019-12-27 14:00:47 | informational | VPN | 安全策略[policy_bj_2]: IPSEC SA建立完成 tunnel mode {ESP 出SPI=0xbc90fdc2 入SPI=0xa76eebb7 加密算法=AES_128 认证算法=HMAC_SHA1 NATOA=none NATD=221.216.210.2:4500 DPD=关闭 PFS=禁止}. | |
2019-12-27 14:00:33 | debug | VPN | 安全策略[policy_bj_2]: 发起IPSEC SA协商. | |
2019-12-27 14:00:33 | informational | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP SA建立完成 {加密算法=aes_128 认证算法=oakley_sha DH组=DH14(modp2048)}. | |
2019-12-27 14:00:31 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:58:44 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:58:44 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:56:38 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:56:37 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:55:55 | notice | 系统 | 用户admin(192.168.100.26)超时。 | |
2019-12-27 13:55:55 | informational | 系统 | 用户admin从192.168.100.26登录。 | |
2019-12-27 13:54:30 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:52:41 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:52:41 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:50:35 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:50:35 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:48:29 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:46:42 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:46:42 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:44:35 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:44:35 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:42:28 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:40:41 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:40:41 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:38:35 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:38:34 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:36:28 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:34:39 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:34:39 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:32:32 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:32:32 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:30:26 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:28:37 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:28:37 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:26:31 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:26:31 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:24:25 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:22:36 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:22:36 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:20:30 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:20:30 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:18:24 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:16:36 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:16:35 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:14:29 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:14:29 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:12:23 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:10:34 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:10:33 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:08:27 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:08:27 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:06:21 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:04:34 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:04:34 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:02:28 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 13:02:27 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 13:00:21 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:58:33 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:58:32 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:56:26 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:56:26 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:54:20 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:52:31 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:52:30 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:50:24 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:50:24 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:48:18 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:46:28 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:46:28 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:44:22 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:44:22 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:42:16 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:40:26 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:40:26 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:38:20 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:38:20 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:36:14 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:34:24 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:34:24 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:32:18 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:32:18 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:30:12 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:28:25 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:28:24 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:26:18 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:26:17 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:24:39 | notice | 系统 | 获取网络时间成功,设备时间已更新为2019-12-27 12:24:39,时区为:GMT +8:00北京,重庆,香港特别行政区,乌鲁木齐。 | |
2019-12-27 12:24:11 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:22:24 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:22:23 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:20:17 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:20:16 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:18:10 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:16:25 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:16:25 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:14:19 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:14:16 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP 协商超时(1). | |
2019-12-27 12:12:10 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:11:08 | debug | VPN | 安全策略[policy_bj_1]: 发起IPSEC SA协商. | |
2019-12-27 12:11:08 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_1]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:11:08 | debug | VPN | 安全策略[policy_bj_2]: 删除IPSEC SA(SPI=0xa76eebb5). | |
2019-12-27 12:11:08 | debug | VPN | 安全策略[policy_bj_2]: 删除IPSEC SA(SPI=0xd1ca0ade). | |
2019-12-27 12:11:08 | debug | VPN | 安全策略[policy_bj_2]: 收到删除IPSEC SA(SPI=0xd1ca0ade)的消息载荷. | |
2019-12-27 12:10:58 | informational | VPN | 安全策略[policy_bj_2]: IPSEC SA建立完成 tunnel mode {ESP 出SPI=0xd1ca0ade 入SPI=0xa76eebb5 加密算法=AES_128 认证算法=HMAC_SHA1 NATOA=none NATD=221.216.210.2:4500 DPD=关闭 PFS=禁止}. | |
2019-12-27 12:10:56 | debug | VPN | 安全策略[policy_bj_2]: 发起IPSEC SA协商. | |
2019-12-27 12:10:56 | informational | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: ISAKMP SA建立完成 {加密算法=aes_128 认证算法=oakley_sha DH组=DH14(modp2048)}. | |
2019-12-27 12:10:54 | debug | VPN | 119.98.218.88<->221.216.210.2[policy_bj_2]: 采用野蛮模式发起ISAKMP协商. | |
2019-12-27 12:09:52 | informational | 系统 | 虚拟服务器已重定向访问设备3389-3389端口的流量至内网192.168.100.26的3389-3389端口。 | |
2019-12-27 12:09:52 | informational | 系统 | WAN1接口DDNS已注册成功,注册的主机名为***.***。 | |
2019-12-27 12:09:52 | notice | 系统 | WAN1接口DDNS功能已启用。 |
北京和武汉分别运营商网络接入,两地做IPSec VPN组网
北京:ER3100G2路由器,版本ERHMG2-MNW100-R1117,地址221.216.210.2
武汉:ERG2-450W路由器,版本 ERG2AW-MNW100-R1107,运营商动态地址分配,使用注册DDNS,***.***
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
为什么使用DPD,不应该是keepalive方式么