VMware VSHIELD MANAGER 4.1.0 UPDATE 1 - API Manuale Utente Pagina 144

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
Vedere la pagina 143
vShield Administration Guide
144 VMware, Inc.
Cisco
<BS>Aug 26 19:00:26 [IKEv1 DEBUG]: Group = 10.20.129.80, IP = 10.20.129.80, sending delete/delete
with reason message
Aug 26 19:00:26 [IKEv1 DEBUG]: Group = 10.20.129.80, IP = 10.20.129.80, constructing blank hash
payload
Aug 26 19:00:26 [IKEv1 DEBUG]: Group = 10.20.129.80, IP = 10.20.129.80, constructing IKE delete
payload
Aug 26 19:00:26 [IKEv1 DEBUG]: Group = 10.20.129.80, IP = 10.20.129.80, constructing qm hash
payload
Aug 26 19:00:26 [IKEv1]: IP = 10.20.129.80, IKE_DECODE SENDING Message (msgid=19eb1e59) with
payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Aug 26 19:00:26 [IKEv1]: Group = 10.20.129.80, IP = 10.20.129.80, Session is being torn down.
Reason: Phase 2 Mismatch
PSK Not Matching
PSKisnegotiatedinthelastroundofPhase1.
vShield Edge
IfPSKnegotiationfails,vShieldEdgestateisSTATE_MAIN_I4.Thepeersendsamessagecontaining
INVALID_ID_INFORMATION.
Aug 26 11:55:55 weiqing-desktop pluto[3855]: "s1-c1" #1: transition from state
STATE_MAIN_I3 to state STATE_MAIN_I4
Aug 26 11:55:55 weiqing-desktop pluto[3855]: "s1-c1" #1: STATE_MAIN_I4: ISAKMP SA
established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1024}
Aug 26 11:55:55 weiqing-desktop pluto[3855]: "s1-c1" #1: Dead Peer Detection (RFC 3706):
enabled
Aug 26 11:55:55 weiqing-desktop pluto[3855]: "s1-c1" #2: initiating Quick Mode
PSK+ENCRYPT+TUNNEL+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:e8add10e
proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1024}
Aug 26 11:55:55 weiqing-desktop pluto[3855]: "s1-c1" #1: ignoring informational payload,
type INVALID_ID_INFORMATION msgid=00000000
Cisco
Aug 26 15:27:07 [IKEv1]: IP = 10.115.199.191, IKE_DECODE SENDING Message (msgid=0) with payloads
: HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR
(13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304
Aug 26 15:27:07 [IKEv1]: Group = 10.115.199.191, IP = 10.115.199.191, Received encrypted Oakley
Main Mode packet with invalid payloads, MessID = 0
Aug 26 15:27:07 [IKEv1]: IP = 10.115.199.191, IKE_DECODE SENDING Message (msgid=0) with payloads
: HDR + NOTIFY (11) + NONE (0) total length : 80
Aug 26 15:27:07 [IKEv1]: Group = 10.115.199.191, IP = 10.115.199.191, ERROR, had problems
decrypting packet, probably due to mismatched pre-shared key. Aborting
Packet Capture for a Successful Negotiation
No. Time Source Destination Protocol Info
9203 768.394800 10.20.129.80 10.20.131.62 ISAKMP Identity Protection
(Main Mode)
Frame 9203 (190 bytes on wire, 190 bytes captured)
Ethernet II, Src: Vmware_9d:2c:dd (00:50:56:9d:2c:dd), Dst: Cisco_80:70:f5 (00:13:c4:80:70:f5)
Internet Protocol, Src: 10.20.129.80 (10.20.129.80), Dst: 10.20.131.62 (10.20.131.62)
User Datagram Protocol, Src Port: isakmp (500), Dst Port: isakmp (500)
Internet Security Association and Key Management Protocol
Initiator cookie: 92585D2D797E9C52
Responder cookie: 0000000000000000
Next payload: Security Association (1)
Vedere la pagina 143
1 2 ... 139 140 141 142 143 144 145 146 147 148 149 ... 161 162

Commenti su questo manuale

Nessun commento