ZyXEL Communications 202H User Manual

Page 292

Advertising
background image

Prestige 202H User’s Guide

28-2

IPSec

Log

Figure 28-2 Example VPN Responder IPSec Log

This menu is useful for troubleshooting. A log index number, the date and time the log was created and a
log message are displayed.

Double exclamation marks (!!) denote an error or warning message.

The following table shows sample log messages during IKE key exchange.

Table 28-1 Sample IKE Key Exchange Logs

LOG MESSAGE

DESCRIPTION

Cannot find outbound SA for rule <#d>

The packet matches the rule index number (#d), but
Phase 1 or Phase 2 negotiation for outbound (from the
VPN initiator) traffic is not finished yet.

Send Main Mode request to <IP>

Send Aggressive Mode request to <IP>

The Prestige has started negotiation with the peer.

Recv Main Mode request from <IP>

Recv Aggressive Mode request from <IP>

The Prestige has received an IKE negotiation request
from the peer.

Send:<Symbol><Symbol>

Recv:<Symbol><Symbol>

IKE uses the ISAKMP protocol (refer to RFC2408 –
ISAKMP) to transmit data. Each ISAKMP packet
contains payloads of different types that show in the
log - see Table 28-3.

Phase 1 IKE SA process done

Phase 1 negotiation is finished.

Index: Date/Time: Log:

------------------------------------------------------------

001 01 Jan 08:08:07 Recv Main Mode request from <192.168.100.100>

002 01 Jan 08:08:07 Recv:<SA>
003 01 Jan 08:08:08 Send:<SA>

004 01 Jan 08:08:08 Recv:<KE><NONCE>

005 01 Jan 08:08:10 Send:<KE><NONCE>

006 01 Jan 08:08:10 Recv:<ID><HASH>

007 01 Jan 08:08:10 Send:<ID><HASH>

008 01 Jan 08:08:10 Phase 1 IKE SA process done
009 01 Jan 08:08:10 Recv:<HASH><SA><NONCE><ID><ID>

010 01 Jan 08:08:10 Start Phase 2: Quick Mode

011 01 Jan 08:08:10 Send:<HASH><SA><NONCE><ID><ID>

012 01 Jan 08:08:10 Recv:<HASH>

Clear IPSec Log (y/n):

Advertising