renegotiated. This default to a value of 10 if not specified.
Viewing Tunnel Monitor Status
The status of an IPsec tunnel monitor can be viewed by using the
hostmon
command. Below is
an example showing messages sent for two tunnels using two different IPv4 addresses.
gw-world:/> hostmon
Monitor sessions:
Session #1:
Failed
Latency ms
Reachable Proto Host
Port Interval Sample (act / max) (act / max)
--------- ----- -------------- ---- -------- ------ ----------- -----------
YES
ICMP
192.168.1.1
1000
5
0
/
4
20
/ 3000
YES
ICMP
192.168.3.1
1000
5
0
/
4
10
/ 3000
If, instead, the
hostmon -verbose
command is used, the source IP of the ICMP messages can also
be seen.
Logging
A log event message is generated by NetDefendOS in the following instances:
•
When a host is determined to be reachable, the following log message is generated:
IPSEC prio=Info id=01803600 rev=1 event=monitored_host_reachable
action=none ip=192.168.1.2 tunnel=PSK-NAT
•
When a host is determined to be unreachable, the following log message is generated:
IPSEC prio=Error id=01803600 rev=1 event=monitored_host_unreachable
action=sas_deleted ip=192.168.1.2 tunnel=PSK-NAT
Example 9.11. Enabling IPsec Tunnel Monitoring
This example will enable tunnel monitoring on an existing
IPsec Tunnel
object called
my_ipsec_tunnel1
. The host used for monitoring has the IPv4 address
203.0.11.5
and it is
acceptable to not get up to 5 replies to the ICMP messages sent.
Command-Line Interface
gw-world:/> Set Interface IPsecTunnel my_ipsec_tunnel1
TunnelMonitor=Yes
MonitoredIP=203.0.11.5
MaxLoss=5
Web Interface
Chapter 9: VPN
722
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...