After the page refreshes, the tunnel configuration will appear in the Tunnel Table at the bottom of the tab. It will not
be enabled automatically, however.
Step 6
To enable the IPsec tunnel, check the “Ena.” check box associated with the tunnel and allow for the page to
refresh.
Step 7
When the IPsec tunnel is established, all IP Packet traffic originating from 192. 32. 8.254/32 will pass through
the IPsec VPN tunnel to the local subnet (10.192.10.192/29), and vice-versa. Click the
View
link in the far-right column
of the table to monitor the IPsec client connection. A window opens to display the log of the tunnel’s negotiation
activity (early events appear near the top and more-recent events appear near the bottom). Search the log contents for
“IPsec SA established tunnel mode.”
002 "ttunnel1" #1: initiating Main Mode
104 "ttunnel1" #1: STATE_MAIN_I1: initiate
003 "ttunnel1" #1: ignoring Vendor ID payload [FRAGMENTATION c0000000]
002 "ttunnel1" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
106 "ttunnel1" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "ttunnel1" #1: received Vendor ID payload [Cisco-Unity]
003 "ttunnel1" #1: received Vendor ID payload [XAUTH]
003 "ttunnel1" #1: ignoring unknown Vendor ID payload [d194db099684f49320f6abd9829c7b65]
003 "ttunnel1" #1: ignoring Vendor ID payload [Cisco VPN 3000 Series]
002 "ttunnel1" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
108 "ttunnel1" #1: STATE_MAIN_I3: sent MI3, expecting MR3
003 "ttunnel1" #1: received Vendor ID payload [Dead Peer Detection]
002 "ttunnel1" #1: Main mode peer ID is ID_IPV4_ADDR: '10.168.86.192'
002 "ttunnel1" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "ttunnel1" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=oakley_3des_cbc_192 prf=oakley_md5 group=modp1024}
002 "ttunnel1" #1: Dead Peer Detection (RFC 3706): enabled
002 "ttunnel1" #2: initiating Quick Mode PSK+UP+IKEv2ALLOW {using
isakmp#1 msgid:4328edc8 proposal=3DES(3)_192-MD5(1)_128 pfsgroup=no-pfs}
117 "ttunnel1" #2: STATE_QUICK_I1: initiate
003 "ttunnel1" #2: ignoring informational payload, type IPSEC_RESPONDER_LIFETIME
msgid=4328edc8
002 "ttunnel1" #2: Dead Peer Detection (RFC 3706): enabled
002 "ttunnel1" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2
004 "ttunnel1" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode
{ESP=>0x8e426351 <0xaeeb3b44 xfrm=3DES_0-HMAC_MD5 NATOA=none NATD=none DPD=enabled}
Vanguard 3000 Series Multicarrier Cellular Data Modem & IP Router PN 001-7300-100 Rev. B
| Page 94