IPSEC无法建立,debugging查看IKE信息 *Jan 1 01:15:19:393 2011 zhengzhousifeng IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 01:15:19:393 2011 zhengzhousifeng IKE/7/EVENT: IKE thread 1097143584 processes a job. *Jan 1 01:15:19:393 2011 zhengzhousifeng IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 01:15:19:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jan 1 01:15:19:394 2011 zhengzhousifeng IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jan 1 01:15:19:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Obtained profile center. *Jan 1 01:15:19:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Initiator created an SA for peer 183.252.16.241, local port 500, remote port 500. *Jan 1 01:15:19:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jan 1 01:15:19:394 2011 zhengzhousifeng IKE/7/EVENT: IKE thread 1097143584 processes a job. *Jan 1 01:15:19:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Begin Aggressive mode exchange. *Jan 1 01:15:19:395 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Pre-shared key matching address 183.252.16.241 not found. *Jan 1 01:15:19:395 2011 zhengzhousifeng IKE/7/ERROR: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 No available proposal. *Jan 1 01:15:19:395 2011 zhengzhousifeng IKE/7/ERROR: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Failed to negotiate IKE SA. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: Received message from ipsec, message type is 0. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: IKE thread 1097143584 processes a job. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: Received SA acquire message from IPsec. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Set IPsec SA state to IKE_P2_STATE_INIT. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: IKE SA not found. Initiate IKE SA negotiation. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Obtained profile center. *Jan 1 01:15:24:393 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Initiator created an SA for peer 183.252.16.241, local port 500, remote port 500. *Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Set IKE SA state to IKE_P1_STATE_INIT. *Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/EVENT: IKE thread 1097143584 processes a job. *Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Begin Aggressive mode exchange. *Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Pre-shared key matching address 183.252.16.241 not found. *Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/ERROR: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 No available proposal. *Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/ERROR: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Failed to negotiate IKE SA.
总部是MSR-2600-23-30,总部采用模板已经有24个IPSEC分支正常连接,配置正常 网段192.168.10.0/24新分布用新的MSR830-5BEI做分支 网络192.168.138.0/24ACL流量触发正常
(0)
最佳答案
您好,请知:
*Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Pre-shared key matching address 183.252.16.241 not found. //提示 Pre-shared key matching address not found 没有匹配上密钥,请检查下密钥是否以跟总部对接上。
*Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 Begin Aggressive mode exchange. //确认下本端和对端是否都启用了IPSEC IKE的野蛮模式
Jan 1 01:15:24:394 2011 zhengzhousifeng IKE/7/ERROR: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500 No available proposal. // No available proposal 没有可用的proposal,检查下proposal的配置。
(0)
你好可以看下我下面的回复吗。第二阶段提示
谢谢现在IKE 可以建立成功 第二阶段IPSEC 建立不起来
Construct NONCE payload.
*Jan 1 02:05:15:673 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Construct IPsec ID payload.
*Jan 1 02:05:15:674 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Construct IPsec ID payload.
*Jan 1 02:05:15:674 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Construct HASH(1) payload.
*Jan 1 02:05:15:674 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Encrypt the packet.
*Jan 1 02:05:15:674 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
IPsec SA state changed from IKE_P2_STATE_GETSPI to IKE_P2_STATE_SEND1.
*Jan 1 02:05:15:674 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Sending packet to 183.252.16.241 remote port 500, local port 500.
*Jan 1 02:05:15:674 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
I-COOKIE: 7a5d79535d5d01cf
R-COOKIE: af19c5e1fa15c6ac
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Quick
flags: ENCRYPT
message ID: 7f60168a
length: 164
*Jan 1 02:05:15:674 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Sending an IPv4 packet.
*Jan 1 02:05:15:675 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Sent data to socket successfully.
*Jan 1 02:05:15:715 2011 zhengzhousifeng IKE/7/EVENT: Received packet successfully.
*Jan 1 02:05:15:715 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Received packet from 183.252.16.241 source port 500 destination port 500.
*Jan 1 02:05:15:715 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
I-COOKIE: 7a5d79535d5d01cf
R-COOKIE: af19c5e1fa15c6ac
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Info
flags: ENCRYPT
message ID: f72054ce
length: 68
*Jan 1 02:05:15:715 2011 zhengzhousifeng IKE/7/EVENT: IKE thread 1097143584 processes a job.
*Jan 1 02:05:15:716 2011 zhengzhousifeng IKE/7/EVENT: Info packet process started.
*Jan 1 02:05:15:716 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Decrypt the packet.
*Jan 1 02:05:15:716 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Received ISAKMP Hash Payload.
*Jan 1 02:05:15:716 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Received ISAKMP Notification Payload.
*Jan 1 02:05:15:717 2011 zhengzhousifeng IKE/7/PACKET: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Parse informational exchange packet successfully.
*Jan 1 02:05:15:717 2011 zhengzhousifeng IKE/7/EVENT: vrf = 0, local = 123.160.230.183, remote = 183.252.16.241/500
Notification INVALID_ID_INFORMATION is received.
*Jan 1 02:05:15:717 2011 zhengzhousifeng IKE/7/EVENT: Delete IPsec SA
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
你好可以看下我下面的回复吗。第二阶段提示