shokonew

Newbie | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору вот отрывок из просмотра клиента который подключен к сети: tpgate(config)# sh ipsec sa interface: outside Crypto map tag: elnmap, local addr. 192.168.0.192 local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0) remote ident (addr/mask/prot/port): (172.20.0.2/255.255.255.255/0/0) current_peer: 192.168.0.64 dynamic allocated peer ip: 172.20.0.2 PERMIT, flags={} #pkts encaps: 55, #pkts encrypt: 55, #pkts digest 55 #pkts decaps: 93, #pkts decrypt: 93, #pkts verify 93 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 192.168.0.192, remote crypto endpt.: 192.168.0.64 path mtu 1500, ipsec overhead 56, media mtu 1500 current outbound spi: 1b477358 inbound esp sas: spi: 0x8d5322df(2371035871) transform: esp-des esp-md5-hmac , in use settings ={Tunnel, } slot: 0, conn id: 4, crypto map: elnmap sa timing: remaining key lifetime (k/sec): (4607990/25689) IV size: 8 bytes replay detection support: Y inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x1b477358(457667416) transform: esp-des esp-md5-hmac , in use settings ={Tunnel, } slot: 0, conn id: 3, crypto map: elnmap sa timing: remaining key lifetime (k/sec): (4607996/25653) IV size: 8 bytes replay detection support: Y tpgate(config)# sh crypto map Crypto Map: "elnmap" interfaces: { outside } client authentication elntac Crypto Map "elnmap" 10 ipsec-isakmp Dynamic map template tag: vpnmap Crypto Map "elnmap" 20 ipsec-isakmp Peer = 192.168.0.64 access-list dynacl4; 1 elements access-list dynacl4 permit ip any host 172.20.0.2 (hitcnt=58) dynamic (created from dynamic map vpnmap/10) Current peer: 192.168.0.64 Security association lifetime: 4608000 kilobytes/28800 seconds PFS (Y/N): N Transform sets={ vpnset, } outbound ah sas: outbound pcp sas: |