Example 2111 Output from the debug crypto isakmp Command

NewYork#debug crypto isakmp

09

19

27

ISAKMP

(8) : beginning Main Mode exchange

09

19

27

ISAKMP

(8): processing SA payload. message ID = 0

09

19

27

ISAKMP

(8): Checking ISAKMP transform 1 against priority

09

19

27

ISAKMP:

encryption AES-256

09

19

27

ISAKMP:

hash SHA

09

19

27

ISAKMP:

default group 5

09

19

27

ISAKMP:

auth pre-share

09

19

27

ISAKMP

(8): atts are acceptable. Next payload is 0

09

19

27

ISAKMP

(8) : SA is doing pre-shared key authentication

09

19

28

ISAKMP

(8): processing KE payload. message ID =

0

09

19

28

ISAKMP

(8): processing NONCE payload. message ID

= 0

09

19

28

ISAKMP

(8): SKEYID state generated

09

19

28

ISAKMP

(8): processing ID payload. message ID =

0

09

19

28

ISAKMP

(8): processing HASH payload. message ID

= 0

09

19

28

ISAKMP

(8) : SA has been authenticated

09

19

28

ISAKMP

(8): beginning Quick Mode exchange, M-ID

of 192036475

09

19

28

ISAKMP

(8): processing SA payload. message ID =

192036475

09

19

28

I SAKMP

(8): Checking IPsec proposal 1

09

19

28

I SAKMP:

transform 1, AES-256

09

19

28

I SAKMP:

attributes in transform:

09

19

28

I SAKMP:

encaps is 1

09

19

28

ISAKMP

SA life type in seconds

09

19

28

ISAKMP

SA life duration (basic) of 1800

0 0

Post a comment