ipsec在出口断开再连之后不能建立vpn。以下是debug ike的信息
<810>ping -a 192.168.0.1 192.168.10.1
Ping 192.168.10.1 (192.168.10.1) from 192.168.0.1: 56 data bytes, press CTRL_C to break
Request time out
*Jan 2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan 2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
I-COOKIE: f05c584ab1fa05b1
R-COOKIE: 50947167fb7115e1
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Quick
flags: ENCRYPT
message ID: c7f637b
length: 300
*Jan 2 04:46:55:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:46:55:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
Request time out
Request time out
*Jan 2 04:47:00:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:00:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:00:131 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
*Jan 2 04:47:01:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:01:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:01:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
--- Ping statistics for 192.168.10.1 ---
5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
<810>%Jan 2 04:47:02:016 2011 810 PING/6/PING_STATISTICS: Ping statistics for 192.168.10.1: 5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.
*Jan 2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan 2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
I-COOKIE: f05c584ab1fa05b1
R-COOKIE: 50947167fb7115e1
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Quick
flags: ENCRYPT
message ID: a0f35038
length: 300
*Jan 2 04:47:05:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:05:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
<810>ping -a 192.168.0.1 192.168.10.1*Jan 2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan 2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan 2 04:47:06:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sent data to socket successfully.
*Jan 2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan 2 04:47:06:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan 2 04:47:06:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sent data to socket successfully.
ping -a 192.168.0.1 192.168.169.1
Ping 192.168.169.1 (192.168.169.1) from 192.168.0.1: 56 data bytes, press CTRL_C to break
*Jan 2 04:47:13:131 2011 810 IKE/7/ERROR: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmission of phase 2 packet timed out.
*Jan 2 04:47:13:131 2011 810 IKE/7/ERROR: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Failed to negotiate IPsec SA.
*Jan 2 04:47:13:131 2011 810 IKE/7/EVENT: Delete IPsec SA.
Request time out
*Jan 2 04:47:14:103 2011 810 IKE/7/EVENT: Received message from ipsec, message type is 0.
*Jan 2 04:47:14:104 2011 810 IKE/7/EVENT: Received SA acquire message from IPsec.
*Jan 2 04:47:14:104 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job.
*Jan 2 04:47:14:104 2011 810 IKE/7/EVENT: Received SA acquire message from IPsec.
*Jan 2 04:47:14:105 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/500
Set IPsec SA state to IKE_P2_STATE_INIT.
*Jan 2 04:47:14:105 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job.
*Jan 2 04:47:14:106 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Begin Quick mode exchange.
*Jan 2 04:47:14:106 2011 810 IKE/7/EVENT: Received message from ipsec, message type is 9.
*Jan 2 04:47:14:107 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
IPsec SA state changed from IKE_P2_STATE_INIT to IKE_P2_STATE_GETSPI.
*Jan 2 04:47:14:107 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job.
*Jan 2 04:47:14:107 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Set attributes according to phase 2 transform.
*Jan 2 04:47:14:107 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Encapsulation mode is Tunnel-UDP.
*Jan 2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
in seconds
*Jan 2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Life duration is 3600.
*Jan 2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
in kilobytes
*Jan 2 04:47:14:108 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Life duration is 1843200.
*Jan 2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
DH group 2.
*Jan 2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Authentication algorithm is HMAC-MD5.
*Jan 2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Key length is 256 bytes.
*Jan 2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Transform ID is AES-CBC.
*Jan 2 04:47:14:109 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct transform 1.
*Jan 2 04:47:14:110 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec proposal 1.
*Jan 2 04:47:14:110 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec SA payload.
*Jan 2 04:47:14:110 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct NONCE payload.
*Jan 2 04:47:14:174 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct KE payload.
*Jan 2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec ID payload.
*Jan 2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct IPsec ID payload.
*Jan 2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Construct HASH(1) payload.
*Jan 2 04:47:14:175 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Encrypt the packet.
*Jan 2 04:47:14:175 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
IPsec SA state changed from IKE_P2_STATE_GETSPI to IKE_P2_STATE_SEND1.
*Jan 2 04:47:14:176 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:14:176 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
I-COOKIE: f05c584ab1fa05b1
R-COOKIE: 50947167fb7115e1
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Quick
flags: ENCRYPT
message ID: c645e6c8
length: 300
*Jan 2 04:47:14:176 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:14:176 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
Request time out
*Jan 2 04:47:20:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:20:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:20:131 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
*Jan 2 04:47:20:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan 2 04:47:20:132 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:20:132 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
I-COOKIE: f05c584ab1fa05b1
R-COOKIE: 50947167fb7115e1
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Quick
flags: ENCRYPT
message ID: c645e6c8
length: 300
*Jan 2 04:47:20:132 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:20:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
*Jan 2 04:47:21:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:21:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:21:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 113.119.71.239/4500
Sent data to socket successfully.
Request time out
--- Ping statistics for 192.168.169.1 ---
5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss
<810>%Jan 2 04:47:22:917 2011 810 PING/6/PING_STATISTICS: Ping statistics for 192.168.169.1: 5 packet(s) transmitted, 0 packet(s) received, 100.0% packet loss.
*Jan 2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan 2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
I-COOKIE: f05c584ab1fa05b1
R-COOKIE: 50947167fb7115e1
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Quick
flags: ENCRYPT
message ID: a0f35038
length: 300
*Jan 2 04:47:23:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:23:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
*Jan 2 04:47:26:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan 2 04:47:26:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan 2 04:47:26:131 2011 810 IKE/7/EVENT: vrf = 0, local = 10.186.150.1, remote = 116.22.5.220/4500
Sent data to socket successfully.
*Jan 2 04:47:26:131 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending packet to 116.22.5.220 remote port 4500, local port 4500.
*Jan 2 04:47:26:132 2011 810 IKE/7/NAT-KEEPALIVE: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sending an IPv4 packet.
*Jan 2 04:47:26:132 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 116.22.5.220/4500
Sent data to socket successfully.
*Jan 2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Retransmit phase 2 packet.
*Jan 2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending packet to 113.119.71.239 remote port 4500, local port 4500.
*Jan 2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
I-COOKIE: f05c584ab1fa05b1
R-COOKIE: 50947167fb7115e1
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Quick
flags: ENCRYPT
message ID: c645e6c8
length: 300
*Jan 2 04:47:29:131 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sending an IPv4 packet.
*Jan 2 04:47:29:131 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500
Sent data to socket successfully.
(0)
最佳答案
reset ipsec和ike的sa,再触发重新debug一下看看
(0)
*Jan 2 04:59:25:024 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job. *Jan 2 04:59:25:025 2011 810 IKE/7/EVENT: Info packet process started. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Decrypt the packet. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Received ISAKMP Hash Payload. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Received ISAKMP Notification Payload. *Jan 2 04:59:25:026 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Parse informational exchange packet successfully. *Jan 2 04:59:25:026 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Notification INVALID_ID_INFORMATION is received. *Jan 2 04:59:25:026 2011 810 IKE/7/EVENT: Delete IPsec SA.
*Jan 2 04:59:25:024 2011 810 IKE/7/EVENT: IKE thread 1097143584 processes a job. *Jan 2 04:59:25:025 2011 810 IKE/7/EVENT: Info packet process started. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Decrypt the packet. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Received ISAKMP Hash Payload. *Jan 2 04:59:25:025 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Received ISAKMP Notification Payload. *Jan 2 04:59:25:026 2011 810 IKE/7/PACKET: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Parse informational exchange packet successfully. *Jan 2 04:59:25:026 2011 810 IKE/7/EVENT: vrf = 0, local = 192.168.168.80, remote = 113.119.71.239/4500 Notification INVALID_ID_INFORMATION is received. *Jan 2 04:59:25:026 2011 810 IKE/7/EVENT: Delete IPsec SA.
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
需要配置上什么发一下么? ike dpd interval 10 on-demand是这个么?还有这个设备是一个分支来的。