• <output id="aynwq"><form id="aynwq"><code id="aynwq"></code></form></output>

    <mark id="aynwq"><option id="aynwq"></option></mark>
  • <mark id="aynwq"><option id="aynwq"></option></mark><label id="aynwq"><dl id="aynwq"></dl></label>
  • 學習啦 > 學習電腦 > 網絡知識 > 路由器 > 路由器知識大全 > 怎樣用DEBUG實現兩個路由器之間做LTL的

    怎樣用DEBUG實現兩個路由器之間做LTL的

    時間: 若木635 分享

    怎樣用DEBUG實現兩個路由器之間做LTL的

      導語:歡迎大家來到學習啦,本文為大帶來怎樣用DEBUG實現兩個路由器之間做LTL的,歡迎大家閱讀借鑒。

      r1#

      r1#

      r1#ping 192.168.20.1 source 192.168.10.1

      Type escape sequence to abort.

      Sending 5, 100-byte ICMP Echos to 192.168.20.1, timeout is 2 seconds:

      Packet sent with a source address of 192.168.10.1

      *Aug 8 20:20:40.323: ISAKMP:(0): SA request profile is (NULL)

      *Aug 8 20:20:40.323: ISAKMP: Created a peer struct for 202.102.1.2, peer port 5

      00

      *Aug 8 20:20:40.323: ISAKMP: New peer created peer = 0x6637AAAC peer_handle = 0

      x80000003

      *Aug 8 20:20:40.323: ISAKMP: Locking peer struct 0x6637AAAC, refcount 1 for isa

      kmp_initiator

      *Aug 8 20:20:40.323: ISAKMP: local port 500, remote port 500

      *Aug 8 20:20:40.323: ISAKMP: set new node 0 to QM_IDLE

      *Aug 8 20:20:40.323: insert sa successfully sa = 65D3B7A8

      *Aug 8 20:20:40.323: ISAKMP:(0):Can not start Aggressive mode, trying Main mode

      .

      *Aug 8 20:20:40.323: ISAKMP:(0):found peer pre-shared key matching 202.102.1.2

      *Aug 8 20:20:40.323: ISAKMP:(0): constructed NAT-T vendor-07 ID

      *Aug 8 20:20:40.323: ISAKMP:(0): constructed NAT-T vendor-03 ID

      *Aug 8 20:20:40.323: ISAKMP:(0): constructed NAT-T vendor-02 ID

      *Aug 8 20:20:40.323: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM

      *Aug 8 20:20:40.323: ISAKMP:(0):Old State = IKE_READY New State = IKE_I_MM1

      *Aug 8 20:20:40.323: ISAKMP:(0): beginning Main Mode exchange

      *Aug 8 20:20:40.323: ISAKMP:(0): sending packet to 202.102.1.2 my_port 500 peer

      _port 500 (I) MM_NO_STATE (發送第一個包)

      *Aug 8 20:20:40.351: ISAKMP (0:0): received packet from 202.102.1.2 dport 500 s

      port 500 Global (I) MM_NO_STATE (接收第二個包)

      *Aug 8 20:20:40.355: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH

      *Aug 8 20:20:40.355: ISAKMP:(0):Old State = IKE_I_MM1 New State = IKE_I_MM2

      *Aug 8 20:20:40.355: ISAKMP:(0): processing SA payload. message ID = 0

      *Aug 8 20:20:40.355: ISAKMP:(0): processing vendor id payload

      *Aug 8 20:20:40.355: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismat

      ch

      *Aug 8 20:20:40.355: ISAKMP (0:0): vendor ID is NAT-T v7

      *Aug 8 20:20:40.355: ISAKMP:(0):found peer pre-shared key matching 202.102.1.2

      *Aug 8 20:20:40.355: ISAKMP:(0): local preshared key found

      *Aug 8 20:20:40.355: ISAKMP : Scanning profiles for xauth ...

      *Aug 8 20:20:40.355: ISAKMP:.!!!!

      Success rate is 80 percent (4/5), round-trip min/avg/max = 28/46/72 ms

      r1#(0):Checking ISAKMP transform 1 against priority 100 policy

      *Aug 8 20:20:40.355: ISAKMP: encryption DES-CBC

      *Aug 8 20:20:40.355: ISAKMP: hash SHA

      *Aug 8 20:20:40.355: ISAKMP: default group 1

      *Aug 8 20:20:40.355: ISAKMP: auth pre-share

      *Aug 8 20:20:40.355: ISAKMP: life type in seconds

      *Aug 8 20:20:40.355: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80

      *Aug 8 20:20:40.355: ISAKMP:(0):atts are acceptable.(雙方都是認同的)Next payload is 0

      如果老是重傳,說明策略不匹配

      *Aug 8 20:20:40.355: ISAKMP:(0): processing vendor id payload

      *Aug 8 20:20:40.355: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch

      *Aug 8 20:20:40.355: ISAKMP (0:0): vendor ID is NAT-T v7

      *Aug 8 20:20:40.355: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MOD

      E

      *Aug 8 20:20:40.355: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM2

      *Aug 8 20:20:40.355: ISAKMP:(0): sending packet to 202.102.1.2 my_port 500 peer

      _port 500 (I) MM_SA_SETUP

      *Aug 8 20:20:40.355: ISAKMP:(0):Input = IKE_ME

      r1#SG_INTERNAL, IKE_PROCESS_COMPLETE

      *Aug 8 20:20:40.355: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM3

      發送一個

      *Aug 8 20:20:40.403: ISAKMP (0:0): received packet from 202.102.1.2 dport 500 s

      port 500 Global (I) MM_SA_SETUP

      *Aug 8 20:20:40.407: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH

      *Aug 8 20:20:40.411: ISAKMP:(0):Old State = IKE_I_MM3 New State = IKE_I_MM4

      接收一個

      *Aug 8 20:20:40.419: ISAKMP:(0): processing KE payload. message ID = 0 公共值

      *Aug 8 20:20:40.423: ISAKMP:(0): processing NONCE payload. message ID = 0 隨機數

      *Aug 8 20:20:40.423: ISAKMP:(0):found peer pre-shared key matching 202.102.1.2

      *Aug 8 20:20:40.423: ISAKMP:(1002): processing vendor id payload

      *Aug 8 20:20:40.423: ISAKMP:(1002): vendor ID is Unity

      *Aug 8 20:20:40.423: ISAKMP:(1002): processing vendor id payload

      *Aug 8 20:20:40.423: ISAKMP:(1002): vendor ID is DPD

      *Aug 8 20:20:40.423: ISAKMP:(1002): processing vendor id payload

      *Aug 8 20:20:40.423: ISAKMP:(1002): speaking to another IOS box!

      *Au

      r1#g 8 20:20:40.423: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_

      MODE

      *Aug 8 20:20:40.423: ISAKMP:(1002):Old State = IKE_I_MM4 New State = IKE_I_MM4

      *Aug 8 20:20:40.423: ISAKMP:(1002):Send initial contact

      *Aug 8 20:20:40.423: ISAKMP:(1002):SA is doing pre-shared key authentication us

      ing id type ID_IPV4_ADDR

      *Aug 8 20:20:40.423: ISAKMP (0:1002): ID payload

    128702 主站蜘蛛池模板: 丰满少妇人妻HD高清大乳在线| 另类欧美视频二区| 国产精品亚洲色婷婷99久久精品| 91手机看片国产福利精品| 国产精品社区在线观看| 福利网站在线观看| 国产成人精品午夜二三区| 香蕉久久夜色精品升级完成| 国产在视频线精品视频| 荡女安然的yin乱生活| 国产**毛片一级视频| 精品国产一区二区三区色欲| 催眠美丽人妇系列| 永久黄网站色视频免费| 亚洲国产欧美国产综合久久| 极品唯美女同互摸互添| 久久天天躁狠狠躁夜夜AV浪潮| 日产精品1区至六区有限公司| 中国大陆一级毛片| 女教师合集乱500篇小说| 99国产精品免费观看视频| 国产精品日韩欧美一区二区| 国产在视频线精品视频2021| 国产亚洲一区二区手机在线观看| 美国农夫激情在线综合| 伊人色在线观看| 欧美成人片在线观看| 久青草国产手机在线观| 无码精品A∨在线观看十八禁 | 久久精品一区二区三区av| 日本免费成人网| 三级黄色在线视频中文| 天堂中文www资源在线| 4399理论片午午伦夜理片| 国产热の有码热の无码视频| 青青草成人免费| 全彩福利本子h全彩在线观看| 波多野结衣痴女系列73| 亚洲av日韩综合一区二区三区 | 色偷偷狠狠色综合网| 免费国产美女爽到喷出水来视频|