对齐方式
MSR3610 配置 L2TP OVER ipsec 移动终端接入 IPsec 协商不起来 ;L2TP 能正常接入。IKE debug
哪位大神能帮忙分析下,客户端是安卓11手机
感谢!!!!
设置列表
对齐方式
| <MSR3610>*Jan 10 21:24:08:060 2022 MSR3610 IKE/7/EVENT: Sent config set message. |
| <MSR3610> |
| *Jan 10 21:24:21:830 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received packet from 171.218.1.34 source port 23548 destination port 500. |
| *Jan 10 21:24:21:830 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 0000000000000000 |
| next payload: SA |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: |
| message ID: 0 |
| length: 724 |
| *Jan 10 21:24:21:830 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:21:830 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:21:830 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Begin a new phase 1 negotiation as responder. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Responder created an SA for peer 171.218.1.34, local port 500, remote port 23548. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Set IKE SA state to IKE_P1_STATE_INIT. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Security Association Payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Vendor ID Payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Vendor ID Payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Vendor ID Payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Vendor ID Payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Vendor ID Payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Vendor ID Payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Process vendor ID payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/EVENT: Vendor ID DPD is matched. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/EVENT: Vendor ID NAT-T rfc3947 is matched. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Process SA payload. |
| *Jan 10 21:24:21:831 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Check ISAKMP transform 1. |
| *Jan 10 21:24:21:832 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Lifetime type is 1. |
| *Jan 10 21:24:21:832 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Life duration is 28800. |
| *Jan 10 21:24:21:832 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Encryption algorithm is AES-CBC. |
| *Jan 10 21:24:21:832 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Key length is 256 bytes. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Authentication method is Pre-shared key. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| HASH algorithm is HMAC-SHA2_384. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| DH group is 2. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Check ISAKMP transform 2. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Lifetime type is 1. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Life duration is 28800. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Encryption algorithm is AES-CBC. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Key length is 256 bytes. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Authentication method is Pre-shared key. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| HASH algorithm is HMAC-SHA2_256. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| DH group is 2. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Check ISAKMP transform 3. |
| *Jan 10 21:24:21:833 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Lifetime type is 1. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Life duration is 28800. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Encryption algorithm is AES-CBC. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Key length is 256 bytes. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Authentication method is Pre-shared key. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| HASH algorithm is HMAC-SHA2_512. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| DH group is 2. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Check ISAKMP transform 4. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Lifetime type is 1. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Life duration is 28800. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Encryption algorithm is AES-CBC. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Key length is 256 bytes. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Authentication method is Pre-shared key. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| HASH algorithm is HMAC-SHA1. |
| *Jan 10 21:24:21:834 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| DH group is 2. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Found pre-shared key that matches address 171.218.1.34 in keychain 1. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Attributes is acceptable. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/EVENT: Oakley transform 4 is acceptable. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Constructed SA payload |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct NAT-T rfc3947 vendor ID payload. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct XAUTH Cisco Unity 1.0 vendor ID payload. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct XAUTH draft6 vendor ID payload. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| IKE SA state changed from IKE_P1_STATE_INIT to IKE_P1_STATE_SEND2. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Sending packet to 171.218.1.34 remote port 23548, local port 500. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: SA |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: |
| message ID: 0 |
| length: 136 |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Sending an IPv4 packet. |
| *Jan 10 21:24:21:835 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Sent data to socket successfully. |
| *Jan 10 21:24:21:868 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received packet from 171.218.1.34 source port 23548 destination port 500. |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: KE |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: |
| message ID: 0 |
| length: 228 |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Key Exchange Payload. |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Nonce Payload. |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP NAT-D Payload. |
| *Jan 10 21:24:21:869 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP NAT-D Payload. |
| *Jan 10 21:24:21:870 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Process KE payload. |
| *Jan 10 21:24:21:870 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Process NONCE payload. |
| *Jan 10 21:24:21:870 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received 2 NAT-D payload. |
| *Jan 10 21:24:21:870 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Peer is behind NAT. |
| *Jan 10 21:24:21:873 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct KE payload. |
| *Jan 10 21:24:21:873 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct NONCE payload. |
| *Jan 10 21:24:21:873 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct NAT-D payload. |
| *Jan 10 21:24:21:874 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct DPD vendor ID payload. |
| *Jan 10 21:24:21:876 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| IKE SA state changed from IKE_P1_STATE_SEND2 to IKE_P1_STATE_SEND4. |
| *Jan 10 21:24:21:877 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Sending packet to 171.218.1.34 remote port 23548, local port 500. |
| *Jan 10 21:24:21:877 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: KE |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: |
| message ID: 0 |
| length: 248 |
| *Jan 10 21:24:21:877 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Sending an IPv4 packet. |
| *Jan 10 21:24:21:877 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Sent data to socket successfully. |
| *Jan 10 21:24:21:903 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:21:903 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:21:903 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:21:903 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:21:908 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:21:908 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Decrypt the packet. |
| *Jan 10 21:24:21:909 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Received ISAKMP Identification Payload. |
| *Jan 10 21:24:21:912 2022 MSR3610 IKE/7/ERROR: 2th byte of the structure ISAKMP Identification Payload must be 0. |
| *Jan 10 21:24:21:912 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Failed to parse phase 1 packet. Reason INVALID_PAYLOAD_TYPE. |
| *Jan 10 21:24:21:913 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Encrypt the packet. |
| *Jan 10 21:24:21:913 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Construct notification packet: INVALID_PAYLOAD_TYPE. |
| *Jan 10 21:24:21:914 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Sending packet to 171.218.1.34 remote port 23549, local port 4500. |
| *Jan 10 21:24:21:914 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: HASH |
| version: ISAKMP Version 1.0 |
| exchange mode: Info |
| flags: ENCRYPT |
| message ID: 1bca5a9e |
| length: 92 |
| *Jan 10 21:24:21:914 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Sending an IPv4 packet. |
| *Jan 10 21:24:21:915 2022 MSR3610 IKE/7/EVENT: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Sent data to socket successfully. |
| *Jan 10 21:24:21:915 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548 |
| Failed to negotiate IKE SA. |
| *Jan 10 21:24:24:951 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:24:951 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:24:951 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:24:951 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:24:951 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:24:951 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:27:953 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:27:953 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:27:953 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:27:953 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:27:953 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:27:953 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:31:001 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:31:001 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:31:001 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:31:001 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:31:001 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:31:001 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:33:965 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:33:965 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:33:965 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:33:965 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:33:966 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:33:966 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:37:035 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:37:035 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:37:035 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:37:036 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:37:036 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:37:036 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:39:987 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:39:987 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:39:987 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:39:987 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:39:987 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:39:987 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:41:995 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:41:995 2022 MSR3610 IKE/7/EVENT: Ignore NAT keepalive packet. |
| *Jan 10 21:24:42:995 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:42:995 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:42:995 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:42:996 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:42:996 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:42:996 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:46:036 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:46:036 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:46:036 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:46:036 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:46:036 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:46:036 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| *Jan 10 21:24:49:075 2022 MSR3610 IKE/7/EVENT: Received packet successfully. |
| *Jan 10 21:24:49:076 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Received packet from 171.218.1.34 source port 23549 destination port 4500. |
| *Jan 10 21:24:49:076 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| I-COOKIE: dae4f81a95f7447d |
| R-COOKIE: 2780ff8ba7934b66 |
| next payload: ID |
| version: ISAKMP Version 1.0 |
| exchange mode: Main |
| flags: ENCRYPT |
| message ID: 0 |
| length: 92 |
| *Jan 10 21:24:49:076 2022 MSR3610 IKE/7/EVENT: IKE thread 1099169456816 processes a job. |
| *Jan 10 21:24:49:076 2022 MSR3610 IKE/7/EVENT: Phase1 process started. |
| *Jan 10 21:24:49:076 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549 |
| Can't find IKE SA. |
| <MSR3610> |
| <MSR3610> |
(0)
最佳答案
*Jan 10 21:24:21:909 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548
Received ISAKMP Identification Payload.
*Jan 10 21:24:21:912 2022 MSR3610 IKE/7/ERROR: 2th byte of the structure ISAKMP Identification Payload must be 0.
*Jan 10 21:24:21:912 2022 MSR3610 IKE/7/ERROR: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548
Failed to parse phase 1 packet. Reason INVALID_PAYLOAD_TYPE.
*Jan 10 21:24:21:913 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548
Encrypt the packet.
*Jan 10 21:24:21:913 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23548
Construct notification packet: INVALID_PAYLOAD_TYPE.
*Jan 10 21:24:21:914 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549
Sending packet to 171.218.1.34 remote port 23549, local port 4500.
*Jan 10 21:24:21:914 2022 MSR3610 IKE/7/PACKET: vrf = 0, local = 222.21.45.14, remote = 171.218.1.34/23549
I-COOKIE: dae4f81a95f7447d
R-COOKIE: 2780ff8ba7934b66
next payload: HASH
version: ISAKMP Version 1.0
exchange mode: Info
flags: ENCRYPT
message ID: 1bca5a9e
length: 92
ike的第5、6条报文交互出错,此阶段要么是由于密钥配置不一致,要么是ike profile配置不对称。 2th byte of the structure ISAKMP Identification Payload must be 0.这个肯定是配置了不对称的密钥,解密失败后,导致协商报文的载荷内容检查失败,就会报如上错误。
(0)
可以对照下案例的配置:
https://zhiliao.h3c.com/Theme/details/187179
另外可以使用inode试下是否正常,是只有安卓11拨不了,还是所有都拨不了
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论