Durabrite zat is ze question | Bonsoir, j'ai changer à nouveau la config : Voici le debug : Code :
- Routeur-OGS#show log
- Syslog logging: enabled (0 messages dropped, 2 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)
- No Active Message Discriminator.
- No Inactive Message Discriminator.
- Console logging: level debugging, 13887 messages logged, xml disabled,
- filtering disabled
- Monitor logging: level debugging, 0 messages logged, xml disabled,
- filtering disabled
- Buffer logging: level debugging, 13887 messages logged, xml disabled,
- filtering disabled
- Exception Logging: size (4096 bytes)
- Count and timestamp logging messages: disabled
- Persistent logging: disabled
- No active filter modules.
- Trap logging: level informational, 90 message lines logged
- Logging Source-Interface: VRF Name:
- Log Buffer (8192 bytes):
- 1.782: ISAKMP:(1023): processing NOTIFY INITIAL_CONTACT protocol 1
- spi 0, message ID = 0, sa = 0x2AF7BBA8
- *Feb 14 23:54:31.782: ISAKMP:(1023):SA authentication status:
- authenticated
- *Feb 14 23:54:31.782: ISAKMP:(1023):SA has been authenticated with 100.41.221.142
- *Feb 14 23:54:31.782: ISAKMP:(1023):SA authentication status:
- authenticated
- *Feb 14 23:54:31.782: ISAKMP:(1023): Process initial contact,
- bring down existing phase 1 and 2 SA's with local 90.210.32.5 remote 100.41.221.142 remote port 500
- *Feb 14 23:54:31.782: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
- *Feb 14 23:54:31.782: ISAKMP:(1023):Old State = IKE_R_MM5 New State = IKE_R_MM5
- *Feb 14 23:54:31.782: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Feb 14 23:54:31.782: Delete IPsec SA by IC, local 90.210.32.5 remote 100.41.221.142 peer port 500
- *Feb 14 23:54:31.782: ISAKMP:(1023):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
- *Feb 14 23:54:31.782: ISAKMP (1023): ID payload
- next-payload : 8
- type : 1
- address : 90.210.32.5
- protocol : 17
- port : 500
- length : 12
- *Feb 14 23:54:31.782: ISAKMP:(1023):Total payload length: 12
- *Feb 14 23:54:31.782: ISAKMP:(1023): sending packet to 100.41.221.142 my_port 500 peer_port 500 (R) MM_KEY_EXCH
- *Feb 14 23:54:31.782: ISAKMP:(1023):Sending an IKE IPv4 Packet.
- *Feb 14 23:54:31.782: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
- *Feb 14 23:54:31.782: ISAKMP:(1023):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE
- *Feb 14 23:54:31.782: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
- *Feb 14 23:54:31.782: ISAKMP:(1023):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
- *Feb 14 23:54:31.782: ISAKMP: Failed to find peer index node to update peer_info_list
- *Feb 14 23:54:31.786: IPSEC(update_current_outbound_sa): updated peer 100.41.221.142 current outbound sa to SPI 0
- *Feb 14 23:54:31.786: IPSEC(delete_sa): deleting SA,
- (sa) sa_dest= 90.210.32.5, sa_proto= 50,
- sa_spi= 0x41662FBF(1097215935),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2043
- sa_lifetime(k/sec)= (4608000/3600),
- (identity) local= 90.210.32.5:0, remote= 100.41.221.142:0,
- local_proxy= 90.210.32.5/255.255.255.255/256/0,
- remote_proxy= 100.41.221.142/255.255.255.255/256/0
- *Feb 14 23:54:31.786: IPSEC(update_current_outbound_sa): updated peer 100.41.221.142 current outbound sa to SPI 0
- *Feb 14 23:54:31.786: IPSEC(delete_sa): deleting SA,
- (sa) sa_dest= 100.41.221.142, sa_proto= 50,
- sa_spi= 0x1D52DE7D(491970173),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2044
- sa_lifetime(k/sec)= (4608000/3600),
- (identity) local= 90.210.32.5:0, remote= 100.41.221.142:0,
- local_proxy= 90.210.32.5/255.255.255.255/256/0,
- remote_proxy= 100.41.221.142/255.255.255.255/256/0
- *Feb 14 23:54:31.786: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel2, changed state to down
- *Feb 14 23:54:31.786: ISAKMP: set new node -616210424 to QM_IDLE
- *Feb 14 23:54:31.786: ISAKMP:(1023): sending packet to 100.41.221.142 my_port 500 peer_port 500 (R) QM_IDLE
- *Feb 14 23:54:31.786: ISAKMP:(1023):Sending an IKE IPv4 Packet.
- *Feb 14 23:54:31.786: ISAKMP:(1023):purging node -616210424
- *Feb 14 23:54:31.786: ISAKMP:(1023):Input = IKE_MESG_FROM_IPSEC, IKE_PHASE2_DEL
- *Feb 14 23:54:31.786: ISAKMP:(1023):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
- *Feb 14 23:54:31.814: ISAKMP (1023): received packet from 100.41.221.142 dport 500 sport 500 Global (R) QM_IDLE
- *Feb 14 23:54:31.814: ISAKMP: set new node -2123739895 to QM_IDLE
- *Feb 14 23:54:31.814: ISAKMP:(1023): processing HASH payload. message ID = 2171227401
- *Feb 14 23:54:31.814: ISAKMP:(1023): processing SA payload. message ID = 2171227401
- *Feb 14 23:54:31.814: ISAKMP:(1023):Checking IPSec proposal 1
- *Feb 14 23:54:31.814: ISAKMP: transform 1, ESP_3DES
- *Feb 14 23:54:31.814: ISAKMP: attributes in transform:
- *Feb 14 23:54:31.814: ISAKMP: SA life type in seconds
- *Feb 14 23:54:31.814: ISAKMP: SA life duration (basic) of 3600
- *Feb 14 23:54:31.814: ISAKMP: encaps is 1 (Tunnel)
- *Feb 14 23:54:31.814: ISAKMP: authenticator is HMAC-SHA
- *Feb 14 23:54:31.814: ISAKMP: group is 5
- *Feb 14 23:54:31.814: ISAKMP:(1023):atts are acceptable.
- *Feb 14 23:54:31.814: IPSEC(validate_proposal_request): proposal part #1
- *Feb 14 23:54:31.814: IPSEC(validate_proposal_request): proposal part #1,
- (key eng. msg.) INBOUND local= 90.210.32.5:0, remote= 100.41.221.142:0,
- local_proxy= 90.210.32.5/255.255.255.255/256/0,
- remote_proxy= 100.41.221.142/255.255.255.255/256/0,
- protocol= ESP, transform= NONE (Tunnel),
- lifedur= 0s and 0kb,
- spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
- *Feb 14 23:54:31.814: Crypto mapdb : proxy_match
- src addr : 90.210.32.5
- dst addr : 100.41.221.142
- protocol : 0
- src port : 0
- dst port : 0
- *Feb 14 23:54:31.874: ISAKMP:(1023): processing NONCE payload. message ID = 2171227401
- *Feb 14 23:54:31.874: ISAKMP:(1023): processing KE payload. message ID = 2171227401
- *Feb 14 23:54:31.950: ISAKMP:(1023): processing ID payload. message ID = 2171227401
- *Feb 14 23:54:31.950: ISAKMP:(1023): processing ID payload. message ID = 2171227401
- *Feb 14 23:54:31.950: ISAKMP:(1023):QM Responder gets spi
- *Feb 14 23:54:31.950: ISAKMP:(1023):Node 2171227401, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
- *Feb 14 23:54:31.950: ISAKMP:(1023):Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE
- *Feb 14 23:54:31.950: ISAKMP:(1023):Node 2171227401, Input = IKE_MESG_INTERNAL, IKE_GOT_SPI
- *Feb 14 23:54:31.950: ISAKMP:(1023):Old State = IKE_QM_SPI_STARVE New State = IKE_QM_IPSEC_INSTALL_AWAIT
- *Feb 14 23:54:31.950: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Feb 14 23:54:31.950: Crypto mapdb : proxy_match
- src addr : 90.210.32.5
- dst addr : 100.41.221.142
- protocol : 256
- src port : 0
- dst port : 0
- *Feb 14 23:54:31.950: IPSEC(crypto_ipsec_create_ipsec_sas): Map found Tunnel2-head-0
- *Feb 14 23:54:31.954: IPSEC(create_sa): sa created,
- (sa) sa_dest= 90.210.32.5, sa_proto= 50,
- sa_spi= 0x663F42A0(1715421856),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2045
- sa_lifetime(k/sec)= (4608000/3600)
- *Feb 14 23:54:31.954: IPSEC(create_sa): sa created,
- (sa) sa_dest= 100.41.221.142, sa_proto= 50,
- sa_spi= 0x1D52DE85(491970181),
- sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2046
- sa_lifetime(k/sec)= (4608000/3600)
- *Feb 14 23:54:31.954: ISAKMP: Failed to find peer index node to update peer_info_list
- *Feb 14 23:54:31.954: ISAKMP:(1023):Received IPSec Install callback... proceeding with the negotiation
- *Feb 14 23:54:31.954: ISAKMP:(1023): sending packet to 100.41.221.142 my_port 500 peer_port 500 (R) QM_IDLE
- *Feb 14 23:54:31.954: ISAKMP:(1023):Sending an IKE IPv4 Packet.
- *Feb 14 23:54:31.954: ISAKMP:(1023):Node 2171227401, Input = IKE_MESG_FROM_IPSEC, IPSEC_INSTALL_DONE
- *Feb 14 23:54:31.954: ISAKMP:(1023):Old State = IKE_QM_IPSEC_INSTALL_AWAIT New State = IKE_QM_R_QM2
- *Feb 14 23:54:31.970: ISAKMP (1023): received packet from 100.41.221.142 dport 500 sport 500 Global (R) QM_IDLE
- *Feb 14 23:54:31.970: ISAKMP:(1023):deleting node -2123739895 error FALSE reason "QM done (await)"
- *Feb 14 23:54:31.970: ISAKMP:(1023):Node 2171227401, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
- *Feb 14 23:54:31.970: ISAKMP:(1023):Old State = IKE_QM_R_QM2 New State = IKE_QM_PHASE2_COMPLETE
- *Feb 14 23:54:31.970: IPSEC(key_engine): got a queue event with 1 KMI message(s)
- *Feb 14 23:54:31.970: IPSEC(key_engine_enable_outbound): rec'd enable notify from ISAKMP
- *Feb 14 23:54:31.970: IPSEC: Expand action denied, notify RP
- *Feb 14 23:54:31.970: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel2, changed state to up
- *Feb 14 23:54:41.574: IPSEC(key_engine): request timer fired: count = 2,
- (identity) local= 90.210.32.5:0, remote= 100.41.221.142:0,
- local_proxy= 0.0.0.0/0.0.0.0/256/0,
- remote_proxy= 0.0.0.0/0.0.0.0/256/0
- *Feb 14 23:55:21.634: ISAKMP:(1022):purging node 1545711744
- *Feb 14 23:55:21.634: ISAKMP:(1022):purging node 1120107884
- *Feb 14 23:55:21.970: ISAKMP:(1023):purging node -2123739895
| J'ai l'impression que y'a de l’évolution mais bon ... Merci encore .
Message édité par Durabrite le 16-02-2019 à 00:53:38
|