暂无
客户使用inode拨号,报错如下
客户最开始使用0528的inode,可以正常拨号,后续重新定制0593的inode
使用新inode就出现上述报错
通过在设备上收集debug信息发现
*Jan 24 19:27:02:249 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL_accept: SSLv3 write certificate A.
*Jan 24 19:27:02:249 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_HANDSHAKE: -COntext=1; Send: TLS 1.0 Handshake [length 0004], message type: ServerHelloDone.
*Jan 24 19:27:02:249 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_KSSL_PACKET: -COntext=1;
0e 00 00 00
*Jan 24 19:27:02:249 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL_accept: SSLv3 write server done A.
*Jan 24 19:27:02:249 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL_accept: SSLv3 flush data.
*Jan 24 19:27:02:249 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL_accept: error in SSLv3 read client certificate A.
*Jan 24 19:27:02:249 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL_accept: error in SSLv3 read client certificate A.
*Jan 24 19:27:02:260 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_HANDSHAKE: -COntext=1; Receive: TLS 1.0 Alert [length 0002], level: fatal, reason: protocol_version.
*Jan 24 19:27:02:260 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_KSSL_PACKET: -COntext=1;
02 46
*Jan 24 19:27:02:260 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL3 alert read, level: fatal, reason: protocol version.
*Jan 24 19:27:02:260 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL_accept: failed in SSLv3 read client certificate A.
*Jan 24 19:27:02:363 2022 F5010-chukou-01 SSLVPNK/7/SSLVPN_DEBUG_KSSL_INFO: -COntext=1; SSL_accept: before/accept initialization.
报错的原因是protocol version导致通信失败
后续发现该inode版本定制时,定制错误,重新定制和更换低一些版本的inode解决
该案例暂时没有网友评论
✖
案例意见反馈
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作