Netgear FVS336G-300NAS Specifications Page 655

  • Download
  • Add to my manuals
  • Print
  • Page
    / 693
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 654
System Logs and Error Messages
655
ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv3
Table 29. System logs: IPSec VPN tunnel, tunnel establishment
Messages 1 through 5
Messages 6 and 7
Messages 8 through 19
Messages 20 and 21
2000 Jan 1 04:01:39 [FVS336Gv3] [wand] [IPSEC] IPSEC Restarted
2000 Jan 1 04:02:09 [FVS336Gv3] [wand] [FW] Firewall Restarted
2000 Jan 1 04:02:29 [FVS336Gv3] [IKE] IKE stopped_
2000 Jan 1 04:02:31 [FVS336Gv3] [IKE] IKE started_
2000 Jan 1 04:02:31 [FVS336Gv3] [wand] [IPSEC] IPSEC Restarted
2000 Jan 1 04:07:04 [FVS336Gv3] [IKE] Adding IPSec configuration with identifier
"pol1"_
2000 Jan 1 04:07:04 [FVS336Gv3] [IKE] Adding IKE configuration with identifier
"pol1"_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Configuration found for 20.0.0.1[500]._
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received request for new phase 1
negotiation: 20.0.0.2[500]<=>20.0.0.1[500]_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Beginning Identity Protection mode._
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received Vendor ID: RFC XXXX_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received Vendor ID: DPD_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] DPD is Enabled_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] For 20.0.0.1[500], Selected NAT-T
version: RFC XXXX_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Setting DPD Vendor ID_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received Vendor ID: KAME/racoon_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] NAT-D payload matches for
20.0.0.2[500]_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] NAT-D payload matches for
20.0.0.1[500]_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] NAT not detected _
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] ISAKMP-SA established for
20.0.0.2[500]-20.0.0.1[500] with spi:c56f7a1d42baf28a:68fcf85e3c148bd8_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Sending Informational Exchange: notify
payload[INITIAL-CONTACT]_
Messages 22 and 23
Messages 24 and 25
2000 Jan 1 04:13:40 [FVS336Gv3] [IKE] Responding to new phase 2 negotiation:
20.0.0.2[0]<=>20.0.0.1[0]_
2000 Jan 1 04:13:40 [FVS336Gv3] [IKE] Using IPSec SA configuration:
192.168.11.0/24<->192.168.10.0/24_
2000 Jan 1 04:13:41 [FVS336Gv3] [IKE] IPSec-SA established: ESP/Tunnel
20.0.0.1->20.0.0.2 with spi=34046092(0x207808c)_
2000 Jan 1 04:13:41 [FVS336Gv3] [IKE] IPSec-SA established: ESP/Tunnel
20.0.0.2->20.0.0.1 with spi=87179451(0x53240bb)_
Explanation Message 1–5: IPSec, IKE, and VPN firewall restart.
Message 6–7: IPSec and IKE configurations are added with the identifier “pol1.”
Message 8–19: New phase 1 negotiation starts by determining the configuration for
the WAN host. Dead Peer Detection (DPD) is enabled and set. NAT payload
matching and NAT detection are done.
Message 20–21: ISAKMP-SA is established between the two WANs and
information is exchanged.
Message 22–23: New phase 2 negotiation starts by using IPSec SA configuration
pertaining to the LAN hosts.
Message 24–25: IPSec-SA VPN tunnel is established.
Page view 654
1 2 ... 650 651 652 653 654 655 656 657 658 659 660 ... 692 693

Comments to this Manuals

No comments