EasyManua.ls Logo

NETGEAR FVS336Gv3 - Page 655

NETGEAR FVS336Gv3
693 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
System Logs and Error Messages
655
ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv3
Table 29. System logs: IPSec VPN tunnel, tunnel establishment
Messages 1 through 5
Messages 6 and 7
Messages 8 through 19
Messages 20 and 21
2000 Jan 1 04:01:39 [FVS336Gv3] [wand] [IPSEC] IPSEC Restarted
2000 Jan 1 04:02:09 [FVS336Gv3] [wand] [FW] Firewall Restarted
2000 Jan 1 04:02:29 [FVS336Gv3] [IKE] IKE stopped_
2000 Jan 1 04:02:31 [FVS336Gv3] [IKE] IKE started_
2000 Jan 1 04:02:31 [FVS336Gv3] [wand] [IPSEC] IPSEC Restarted
2000 Jan 1 04:07:04 [FVS336Gv3] [IKE] Adding IPSec configuration with identifier
"pol1"_
2000 Jan 1 04:07:04 [FVS336Gv3] [IKE] Adding IKE configuration with identifier
"pol1"_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Configuration found for 20.0.0.1[500]._
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received request for new phase 1
negotiation: 20.0.0.2[500]<=>20.0.0.1[500]_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Beginning Identity Protection mode._
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received Vendor ID: RFC XXXX_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received Vendor ID: DPD_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] DPD is Enabled_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] For 20.0.0.1[500], Selected NAT-T
version: RFC XXXX_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Setting DPD Vendor ID_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Received Vendor ID: KAME/racoon_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] NAT-D payload matches for
20.0.0.2[500]_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] NAT-D payload matches for
20.0.0.1[500]_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] NAT not detected _
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] ISAKMP-SA established for
20.0.0.2[500]-20.0.0.1[500] with spi:c56f7a1d42baf28a:68fcf85e3c148bd8_
2000 Jan 1 04:13:39 [FVS336Gv3] [IKE] Sending Informational Exchange: notify
payload[INITIAL-CONTACT]_
Messages 22 and 23
Messages 24 and 25
2000 Jan 1 04:13:40 [FVS336Gv3] [IKE] Responding to new phase 2 negotiation:
20.0.0.2[0]<=>20.0.0.1[0]_
2000 Jan 1 04:13:40 [FVS336Gv3] [IKE] Using IPSec SA configuration:
192.168.11.0/24<->192.168.10.0/24_
2000 Jan 1 04:13:41 [FVS336Gv3] [IKE] IPSec-SA established: ESP/Tunnel
20.0.0.1->20.0.0.2 with spi=34046092(0x207808c)_
2000 Jan 1 04:13:41 [FVS336Gv3] [IKE] IPSec-SA established: ESP/Tunnel
20.0.0.2->20.0.0.1 with spi=87179451(0x53240bb)_
Explanation Message 1–5: IPSec, IKE, and VPN firewall restart.
Message 6–7: IPSec and IKE configurations are added with the identifier “pol1.”
Message 8–19: New phase 1 negotiation starts by determining the configuration for
the WAN host. Dead Peer Detection (DPD) is enabled and set. NAT payload
matching and NAT detection are done.
Message 20–21: ISAKMP-SA is established between the two WANs and
information is exchanged.
Message 22–23: New phase 2 negotiation starts by using IPSec SA configuration
pertaining to the LAN hosts.
Message 24–25: IPSec-SA VPN tunnel is established.

Table of Contents

Related product manuals