03.04.2013 Views

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

fortigate-ipsec-40-mr3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Troubleshooting L2TP and IPsec (Microsoft VPN)<br />

2010-01-11 16:39:58 log_id=0101037129 type=event subtype=<strong>ipsec</strong> pri=notice<br />

vd="root" msg="progress IPsec phase 2" action="negotiate" rem_ip=172.20.120.151<br />

loc_ip=172.20.120.141 rem_port=500 loc_port=500 out_intf="port1"<br />

cookies="5f6da1c0e4bbf680/d6a1009eb1dde780" user="N/A" group="N/A"<br />

xauth_user="N/A" xauth_group="N/A" vpn_tunnel="dialup_p1_0" status=success<br />

init=remote mode=quick dir=outbound stage=1 role=responder result=OK<br />

2010-01-11 16:39:58 log_id=0101037133 type=event subtype=<strong>ipsec</strong> pri=notice<br />

vd="root" msg="install IPsec SA" action="install_sa" rem_ip=172.20.120.151<br />

loc_ip=172.20.120.141 rem_port=500 loc_port=500 out_intf="port1"<br />

cookies="5f6da1c0e4bbf680/d6a1009eb1dde780" user="N/A" group="N/A"<br />

xauth_user="N/A" xauth_group="N/A" vpn_tunnel="dialup_p1_0" role=responder<br />

in_spi=61100fe2 out_spi=bd70fca1<br />

2010-01-11 16:39:58 log_id=0101037139 type=event subtype=<strong>ipsec</strong> pri=notice<br />

vd="root" msg="IPsec phase 2 status change" action="phase2-up"<br />

rem_ip=172.20.120.151 loc_ip=172.20.120.141 rem_port=500 loc_port=500<br />

out_intf="port1" cookies="5f6da1c0e4bbf680/d6a1009eb1dde780" user="N/A"<br />

group="N/A" xauth_user="N/A" xauth_group="N/A" vpn_tunnel="dialup_p1_0"<br />

phase2_name=dialup_p2<br />

2010-01-11 16:39:58 log_id=0101037138 type=event subtype=<strong>ipsec</strong> pri=notice<br />

vd="root" msg="IPsec connection status change" action="tunnel-up"<br />

rem_ip=172.20.120.151 loc_ip=172.20.120.141 rem_port=500 loc_port=500<br />

out_intf="port1" cookies="5f6da1c0e4bbf680/d6a1009eb1dde780" user="N/A"<br />

group="N/A" xauth_user="N/A" xauth_group="N/A" vpn_tunnel="dialup_p1_0"<br />

tunnel_ip=172.20.120.151 tunnel_id=1552003005 tunnel_type=<strong>ipsec</strong> duration=0 sent=0<br />

rcvd=0 next_stat=0 tunnel=dialup_p1_0<br />

2010-01-11 16:39:58 log_id=0101037129 type=event subtype=<strong>ipsec</strong> pri=notice<br />

vd="root" msg="progress IPsec phase 2" action="negotiate" rem_ip=172.20.120.151<br />

loc_ip=172.20.120.141 rem_port=500 loc_port=500 out_intf="port1"<br />

cookies="5f6da1c0e4bbf680/d6a1009eb1dde780" user="N/A" group="N/A"<br />

xauth_user="N/A" xauth_group="N/A" vpn_tunnel="dialup_p1_0" status=success<br />

init=remote mode=quick dir=inbound stage=2 role=responder result=DONE<br />

2010-01-11 16:39:58 log_id=0101037122 type=event subtype=<strong>ipsec</strong> pri=notice<br />

vd="root" msg="negotiate IPsec phase 2" action="negotiate" rem_ip=172.20.120.151<br />

loc_ip=172.20.120.141 rem_port=500 loc_port=500 out_intf="port1"<br />

cookies="5f6da1c0e4bbf680/d6a1009eb1dde780" user="N/A" group="N/A"<br />

xauth_user="N/A" xauth_group="N/A" vpn_tunnel="dialup_p1_0" status=success<br />

role=responder esp_transform=ESP_3DES esp_auth=HMAC_SHA1<br />

2010-01-11 16:39:58 log_id=0103031008 type=event subtype=ppp vd=root<br />

pri=information action=connect status=success msg="Client 172.20.120.151 control<br />

connection started (id 805), assigned ip 192.168.6.85"<br />

2010-01-11 16:39:58 log_id=0103029013 type=event subtype=ppp vd=root pri=notice<br />

pppd is started<br />

2010-01-11 16:39:58 log_id=0103029002 type=event subtype=ppp vd=root pri=notice<br />

user="user1" local=172.20.120.141 remote=172.20.120.151 assigned=192.168.6.85<br />

action=auth_success msg="User 'user1' using l2tp with authentication protocol<br />

MSCHAP_V2, succeeded"<br />

2010-01-11 16:39:58 log_id=0103031101 type=event subtype=ppp vd=root<br />

pri=information action=tunnel-up tunnel_id=1645784497 tunnel_type=l2tp<br />

remote_ip=172.20.120.151 tunnel_ip=192.168.6.85 user="user1" group="L2TPusers"<br />

msg="L2TP tunnel established"<br />

IPsec VPNs for FortiOS 4.0 MR3<br />

210 01-434-112804-20120111<br />

http://docs.fortinet.com/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!