beautypg.com

3 verify vpn tunnel establishment – Asus SL1000 User Manual

Page 10

background image

Copyright 2006, ASUSTek Computer, Inc.

Page

7

3.3 Verify VPN Tunnel Establishment

pix-firewall# show crypto isakmp sa

Total : 1

Embryonic : 0

dst src state pending created

10.64.2.130 10.64.2.145 QM_IDLE 0 1

pix-firewall# show crypto ipsec sa

interface: outside

Crypto map tag: toSL1000, local addr. 10.64.2.130

local ident (addr/mask/prot/port): (192.168.30.0/255.255.255.0/0/0)

remote ident (addr/mask/prot/port): (10.64.3.0/255.255.255.0/0/0)

current_peer: 10.64.2.145:500

PERMIT, flags={origin_is_acl,}

#pkts encaps: 12, #pkts encrypt: 12, #pkts digest 12

#pkts decaps: 12, #pkts decrypt: 12, #pkts verify 12

#pkts compressed: 0, #pkts decompressed: 0

#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0

#send errors 0, #recv errors 0

local crypto endpt.: 10.64.2.130, remote crypto endpt.: 10.64.2.145

path mtu 1500, ipsec overhead 56, media mtu 1500

current outbound spi: 5f4579cf

inbound esp sas:

spi: 0x991686ee(2568390382)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

slot: 0, conn id: 1, crypto map: toSL1000

sa timing: remaining key lifetime (k/sec): (74998/3472)

IV size: 8 bytes

replay detection support: Y

inbound ah sas:

inbound pcp sas:

outbound esp sas:

spi: 0x5f4579cf(1598388687)

transform: esp-3des esp-sha-hmac ,

in use settings ={Tunnel, }

slot: 0, conn id: 2, crypto map: toSL1000