System Logs and Error Messages
429
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
Table 121. System logs: IPSec VPN tunnel, tunnel establishment
Messages 1 through 5
Messages 6 and 7
Messages 8 through 19
Messages 20 and 21
Messages 22 and 23
Messages 24 and 25
2000 Jan 1 04:01:39 [SRX5308] [wand] [IPSEC] IPSEC Restarted
2000 Jan 1 04:02:09 [SRX5308] [wand] [FW] Firewall Restarted
2000 Jan 1 04:02:29 [SRX5308] [IKE] IKE stopped_
2000 Jan 1 04:02:31 [SRX5308] [IKE] IKE started_
2000 Jan 1 04:02:31 [SRX5308] [wand] [IPSEC] IPSEC Restarted
2000 Jan 1 04:07:04 [SRX5308] [IKE] Adding IPSec configuration with identifier
"pol1"_
2000 Jan 1 04:07:04 [SRX5308] [IKE] Adding IKE configuration with identifier
"pol1"_
2000 Jan 1 04:13:39 [SRX5308] [IKE] Configuration found for 20.0.0.1[500]._
2000 Jan 1 04:13:39 [SRX5308] [IKE] Received request for new phase 1
negotiation: 20.0.0.2[500]<=>20.0.0.1[500]_
2000 Jan 1 04:13:39 [SRX5308] [IKE] Beginning Identity Protection mode._
2000 Jan 1 04:13:39 [SRX5308] [IKE] Received Vendor ID: RFC XXXX_
2000 Jan 1 04:13:39 [SRX5308] [IKE] Received Vendor ID: DPD_
2000 Jan 1 04:13:39 [SRX5308] [IKE] DPD is Enabled_
2000 Jan 1 04:13:39 [SRX5308] [IKE] For 20.0.0.1[500], Selected NAT-T version:
RFC XXXX_
2000 Jan 1 04:13:39 [SRX5308] [IKE] Setting DPD Vendor ID_
2000 Jan 1 04:13:39 [SRX5308] [IKE] Received Vendor ID: KAME/racoon_
2000 Jan 1 04:13:39 [SRX5308] [IKE] NAT-D payload matches for 20.0.0.2[500]_
2000 Jan 1 04:13:39 [SRX5308] [IKE] NAT-D payload matches for 20.0.0.1[500]_
2000 Jan 1 04:13:39 [SRX5308] [IKE] NAT not detected _
2000 Jan 1 04:13:39 [SRX5308] [IKE] ISAKMP-SA established for
20.0.0.2[500]-20.0.0.1[500] with spi:c56f7a1d42baf28a:68fcf85e3c148bd8_
2000 Jan 1 04:13:39 [SRX5308] [IKE] Sending Informational Exchange: notify
payload[INITIAL-CONTACT]_
2000 Jan 1 04:13:40 [SRX5308] [IKE] Responding to new phase 2 negotiation:
20.0.0.2[0]<=>20.0.0.1[0]_
2000 Jan 1 04:13:40 [SRX5308] [IKE] Using IPSec SA configuration:
192.168.11.0/24<->192.168.10.0/24_
2000 Jan 1 04:13:41 [SRX5308] [IKE] IPSec-SA established: ESP/Tunnel
20.0.0.1->20.0.0.2 with spi=34046092(0x207808c)_
2000 Jan 1 04:13:41 [SRX5308] [IKE] IPSec-SA established: ESP/Tunnel
20.0.0.2->20.0.0.1 with spi=87179451(0x53240bb)_
Explanation Message 1–5: IPSec, IKE, and VPN firewall restart.
Message 6–7: IPSec and IKE configurations are added with the identifier “pol1.”
Message 8–19: New phase 1 negotiation starts by determining the configuration for
the WAN host. Dead Peer Detection (DPD) is enabled and set. NAT payload
matching and NAT detection are done.
Message 20–21: ISAKMP-SA is established between the 2 WANs and information
is exchanged.
Message 22–23: New phase 2 negotiation starts by using IPSec SA configuration
pertaining to the LAN hosts.
Message 24–25: IPSec-SA VPN tunnel is established.
Recommended action None