六月丁香五月婷婷,丁香五月婷婷网,欧美激情网站,日本护士xxxx,禁止18岁天天操夜夜操,18岁禁止1000免费,国产福利无码一区色费

學(xué)習(xí)啦 > 學(xué)習(xí)電腦 > 網(wǎng)絡(luò)知識 > 路由器 > 路由器知識大全 > 怎樣用DEBUG實(shí)現(xiàn)兩個(gè)路由器之間做LTL的

怎樣用DEBUG實(shí)現(xiàn)兩個(gè)路由器之間做LTL的

時(shí)間: 若木635 分享

怎樣用DEBUG實(shí)現(xiàn)兩個(gè)路由器之間做LTL的

  導(dǎo)語:歡迎大家來到學(xué)習(xí)啦,本文為大帶來怎樣用DEBUG實(shí)現(xiàn)兩個(gè)路由器之間做LTL的,歡迎大家閱讀借鑒。

  r1#

  r1#

  r1#ping 192.168.20.1 source 192.168.10.1

  Type escape sequence to abort.

  Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:

  Packet sent with a source address of 192.168.10.1

  *Aug 8 20:20:40.323: ISAKMP:(0): SA request profile is (NULL)

  *Aug 8 20:20:40.323: ISAKMP: Created a peer struct for 202.102.1.2, peer port 5

  00

  *Aug 8 20:20:40.323: ISAKMP: New peer created peer = 0x6637AAAC peer_handle = 0

  x80000003

  *Aug 8 20:20:40.323: ISAKMP: Locking peer struct 0x6637AAAC, refcount 1 for isa

  kmp_initiator

  *Aug 8 20:20:40.323: ISAKMP: local port 500, remote port 500

  *Aug 8 20:20:40.323: ISAKMP: set new node 0 to QM_IDLE

  *Aug 8 20:20:40.323: insert sa successfully sa = 65D3B7A8

  *Aug 8 20:20:40.323: ISAKMP:(0):Can not start Aggressive mode, trying Main mode

  .

  *Aug 8 20:20:40.323: ISAKMP:(0):found peer pre-shared key matching 202.102.1.2

  *Aug 8 20:20:40.323: ISAKMP:(0): constructed NAT-T vendor-07 ID

  *Aug 8 20:20:40.323: ISAKMP:(0): constructed NAT-T vendor-03 ID

  *Aug 8 20:20:40.323: ISAKMP:(0): constructed NAT-T vendor-02 ID

  *Aug 8 20:20:40.323: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM

  *Aug 8 20:20:40.323: ISAKMP:(0):Old State = IKE_READY New State = IKE_I_MM1

  *Aug 8 20:20:40.323: ISAKMP:(0): beginning Main Mode exchange

  *Aug 8 20:20:40.323: ISAKMP:(0): sending packet to 202.102.1.2 my_port 500 peer

  _port 500 (I) MM_NO_STATE (發(fā)送第一個(gè)包)

  *Aug 8 20:20:40.351: ISAKMP (0:0): received packet from 202.102.1.2 dport 500 s

  port 500 Global (I) MM_NO_STATE (接收第二個(gè)包)

  *Aug 8 20:20:40.355: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH

  *Aug 8 20:20:40.355: ISAKMP:(0):Old State = IKE_I_MM1 New State = IKE_I_MM2

  *Aug 8 20:20:40.355: ISAKMP:(0): processing SA payload. message ID = 0

  *Aug 8 20:20:40.355: ISAKMP:(0): processing vendor id payload

  *Aug 8 20:20:40.355: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismat

  ch

  *Aug 8 20:20:40.355: ISAKMP (0:0): vendor ID is NAT-T v7

  *Aug 8 20:20:40.355: ISAKMP:(0):found peer pre-shared key matching 202.102.1.2

  *Aug 8 20:20:40.355: ISAKMP:(0): local preshared key found

  *Aug 8 20:20:40.355: ISAKMP : Scanning profiles for xauth ...

  *Aug 8 20:20:40.355: ISAKMP:.!!!!

  Success rate is 80 percent (4/5), round-trip min/avg/max = 28/46/72 ms

  r1#(0):Checking ISAKMP transform 1 against priority 100 policy

  *Aug 8 20:20:40.355: ISAKMP: encryption DES-CBC

  *Aug 8 20:20:40.355: ISAKMP: hash SHA

  *Aug 8 20:20:40.355: ISAKMP: default group 1

  *Aug 8 20:20:40.355: ISAKMP: auth pre-share

  *Aug 8 20:20:40.355: ISAKMP: life type in seconds

  *Aug 8 20:20:40.355: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80

  *Aug 8 20:20:40.355: ISAKMP:(0):atts are acceptable.(雙方都是認(rèn)同的)Next payload is 0

  如果老是重傳,說明策略不匹配

  *Aug 8 20:20:40.355: ISAKMP:(0): processing vendor id payload

  *Aug 8 20:20:40.355: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch

  *Aug 8 20:20:40.355: ISAKMP (0:0): vendor ID is NAT-T v7

  *Aug 8 20:20:40.355: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MOD

  E

  *Aug 8 20:20:40.355: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM2

  *Aug 8 20:20:40.355: ISAKMP:(0): sending packet to 202.102.1.2 my_port 500 peer

  _port 500 (I) MM_SA_SETUP

  *Aug 8 20:20:40.355: ISAKMP:(0):Input = IKE_ME

  r1#SG_INTERNAL, IKE_PROCESS_COMPLETE

  *Aug 8 20:20:40.355: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM3

  發(fā)送一個(gè)

  *Aug 8 20:20:40.403: ISAKMP (0:0): received packet from 202.102.1.2 dport 500 s

  port 500 Global (I) MM_SA_SETUP

  *Aug 8 20:20:40.407: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH

  *Aug 8 20:20:40.411: ISAKMP:(0):Old State = IKE_I_MM3 New State = IKE_I_MM4

  接收一個(gè)

  *Aug 8 20:20:40.419: ISAKMP:(0): processing KE payload. message ID = 0 公共值

  *Aug 8 20:20:40.423: ISAKMP:(0): processing NONCE payload. message ID = 0 隨機(jī)數(shù)

  *Aug 8 20:20:40.423: ISAKMP:(0):found peer pre-shared key matching 202.102.1.2

  *Aug 8 20:20:40.423: ISAKMP:(1002): processing vendor id payload

  *Aug 8 20:20:40.423: ISAKMP:(1002): vendor ID is Unity

  *Aug 8 20:20:40.423: ISAKMP:(1002): processing vendor id payload

  *Aug 8 20:20:40.423: ISAKMP:(1002): vendor ID is DPD

  *Aug 8 20:20:40.423: ISAKMP:(1002): processing vendor id payload

  *Aug 8 20:20:40.423: ISAKMP:(1002): speaking to another IOS box!

  *Au

  r1#g 8 20:20:40.423: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_

  MODE

  *Aug 8 20:20:40.423: ISAKMP:(1002):Old State = IKE_I_MM4 New State = IKE_I_MM4

  *Aug 8 20:20:40.423: ISAKMP:(1002):Send initial contact

  *Aug 8 20:20:40.423: ISAKMP:(1002):SA is doing pre-shared key authentication us

  ing id type ID_IPV4_ADDR

  *Aug 8 20:20:40.423: ISAKMP (0:1002): ID payload

128702