ZyXEL P-202H User Guide - Page 316

Table 106

Page 316 highlights

P-202H Plus v2 User's Guide Figure 210 Example VPN Responder IPSec Log Index: Date/Time: Log: 001 01 Jan 08:08:07 Recv Main Mode request from 002 01 Jan 08:08:07 Recv: 003 01 Jan 08:08:08 Send: 004 01 Jan 08:08:08 Recv: 005 01 Jan 08:08:10 Send: 006 01 Jan 08:08:10 Recv: 007 01 Jan 08:08:10 Send: 008 01 Jan 08:08:10 Phase 1 IKE SA process done 009 01 Jan 08:08:10 Recv: 010 01 Jan 08:08:10 Start Phase 2: Quick Mode 011 01 Jan 08:08:10 Send: 012 01 Jan 08:08:10 Recv: Clear IPSec Log (y/n): This menu is useful for troubleshooting. A log index number, the date and time the log was created and a log message are displayed. Note: Double exclamation marks (!!) denote an error or warning message. The following table shows sample log messages during IKE key exchange. Table 106 Sample IKE Key Exchange Logs LOG MESSAGE DESCRIPTION Cannot find outbound SA for rule Send Main Mode request to Send Aggressive Mode request to The packet matches the rule index number (#d), but Phase 1 or Phase 2 negotiation for outbound (from the VPN initiator) traffic is not finished yet. The ZyXEL Device has started negotiation with the peer. Recv Main Mode request from The ZyXEL Device has received an IKE negotiation Recv Aggressive Mode request from request from the peer. Send: Recv: IKE uses the ISAKMP protocol (refer to RFC2408 ISAKMP) to transmit data. Each ISAKMP packet contains payloads of different types that show in the log - see Table 108 on page 317. Phase 1 IKE SA process done Start Phase 2: Quick Mode Phase 1 negotiation is finished. Phase 2 negotiation is beginning using Quick Mode. !! IKE Negotiation is in process The ZyXEL Device has begun negotiation with the peer for the connection already, but the IKE key exchange has not finished yet. !! Duplicate requests with the same cookie The ZyXEL Device has received multiple requests from the same peer but it is still processing the first IKE packet from that peer. 315 Chapter 35 IPSec Log

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375

P-202H Plus v2 User’s Guide
315
Chapter 35 IPSec Log
Figure 210
Example VPN Responder IPSec Log
This menu is useful for troubleshooting. A log index number, the date and time the log was
created and a log message are displayed.
Note:
Double exclamation marks (!!) denote an error or warning message.
The following table shows sample log messages during IKE key exchange.
Index:
Date/Time:
Log:
------------------------------------------------------------
001
01 Jan 08:08:07
Recv Main Mode request from <192.168.100.100>
002
01 Jan 08:08:07
Recv:<SA>
003
01 Jan 08:08:08
Send:<SA>
004
01 Jan 08:08:08
Recv:<KE><NONCE>
005
01 Jan 08:08:10
Send:<KE><NONCE>
006
01 Jan 08:08:10
Recv:<ID><HASH>
007
01 Jan 08:08:10
Send:<ID><HASH>
008
01 Jan 08:08:10
Phase 1 IKE SA process done
009
01 Jan 08:08:10
Recv:<HASH><SA><NONCE><ID><ID>
010
01 Jan 08:08:10
Start Phase 2: Quick Mode
011
01 Jan 08:08:10
Send:<HASH><SA><NONCE><ID><ID>
012
01 Jan 08:08:10
Recv:<HASH>
Clear IPSec Log (y/n):
Table 106
Sample IKE Key Exchange Logs
LOG MESSAGE
DESCRIPTION
Cannot find outbound SA for rule <#d>
The packet matches the rule index number (#d), but
Phase 1 or Phase 2 negotiation for outbound (from the
VPN initiator) traffic is not finished yet.
Send Main Mode request to <IP>
Send Aggressive Mode request to <IP>
The ZyXEL Device has started negotiation with the peer.
Recv Main Mode request from <IP>
Recv Aggressive Mode request from <IP>
The ZyXEL Device has received an IKE negotiation
request from the peer.
Send:<Symbol><Symbol>
Recv:<Symbol><Symbol>
IKE uses the ISAKMP protocol (refer to RFC2408 -
ISAKMP) to transmit data. Each ISAKMP packet contains
payloads of different types that show in the log - see
Table 108 on page 317
.
Phase 1 IKE SA process done
Phase 1 negotiation is finished.
Start Phase 2: Quick Mode
Phase 2 negotiation is beginning using Quick Mode.
!! IKE Negotiation is in process
The ZyXEL Device has begun negotiation with the peer for
the connection already, but the IKE key exchange has not
finished yet.
!! Duplicate requests with the same
cookie
The ZyXEL Device has received multiple requests from
the same peer but it is still processing the first IKE packet
from that peer.