⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 111.txt

📁 debug代码 替朋友写的一个小论坛(供新人参考)也是使用的ASP编写的
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 172.16.10.1, timeout is 2 seconds:
Packet sent with a source address of 172.16.11.1 

*Mar  7 16:31:38.434: ISAKMP:(0): SA request profile is (NULL)
*Mar  7 16:31:38.438: ISAKMP: Created a peer struct for 192.168.12.1, peer port 500
*Mar  7 16:31:38.438: ISAKMP: New peer created peer = 0x657CC3B4 peer_handle = 0x80000002
*Mar  7 16:31:38.438: ISAKMP: Locking peer struct 0x657CC3B4, refcount 1 for isakmp_initiator
*Mar  7 16:31:38.442: ISAKMP: local port 500, remote port 500
*Mar  7 16:31:38.442: ISAKMP: set new node 0 to QM_IDLE      
*Mar  7 16:31:38.454: insert sa successfully sa = 658BC4CC
*Mar  7 16:31:38.454: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
*Mar  7 16:31:38.454: ISAKMP:(0):found peer pre-shared key matching 192.168.12.1
*Mar  7 16:31:38.458: ISAKMP:(0): constructed NAT-T vendor-07 ID
*Mar  7 16:31:38.462: ISAKMP:(0): constructed NAT-T vendor-03 ID
*Mar  7 16:31:38.462: ISAKMP:(0): constructed NAT-T vendor-02 ID
*Mar  7 16:31:38.466: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
*Mar  7 16:31:38.466: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1 

*Mar  7 16:31:38.466: ISAKMP:(0): beginning Main Mode exchange
*Mar  7 16:31:38.466: ISAKMP:(0): sending packet to 192.168.12.1 my_port 500 peer_port 500 (I) MM_NO_STATE
*Mar  7 16:31:38.702: ISAKMP (0:0): received packet from 192.168.12.1 dport 500 sport 500 Global (I) MM_NO_STATE
*Mar  7 16:31:38.714: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar  7 16:31:38.718: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2 

*Mar  7 16:31:38.722: ISAKMP:(0): processing SA payload. message ID = 0
*Mar  7 16:31:38.722: ISAKMP:(0): processing vendor id payload
*Mar  7 16:31:38.722: ISAKMP:(0): vendor ID seems Unity/DPD but major 194 mismatch
*Mar  7 16:31:38.726: ISAKMP:(0):found peer pre-shared key matching 192.168.12.1
*Mar  7 16:31:38.726: ISAKMP:(0): local preshared key found
*Mar  7 16:31:38.726: ISAKMP : Scanning profiles for xauth ...
*Mar  7 16:31:38.726: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 pol.icy
*Mar  7 16:31:38.730: ISAKMP:      encryption 3DES-CBC
*Mar  7 16:31:38.730: ISAKMP:      hash MD5
*Mar  7 16:31:38.730: ISAKMP:      default group 2
*Mar  7 16:31:38.730: ISAKMP:      auth pre-share
*Mar  7 16:31:38.730: ISAKMP:      life type in seconds
*Mar  7 16:31:38.730: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
*Mar  7 16:31:38.734: ISAKMP:(0):atts are acceptable. Next payload is 0
*Mar  7 16:31:38.734: ISAKMP:(0): processing vendor id payload
*Mar  7 16:31:38.738: ISAKMP:(0): vendor ID seems Unity/DPD but major 194 mismatch
*Mar  7 16:31:38.738: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar  7 16:31:38.738: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2 

*Mar  7 16:31:38.754: ISAKMP:(0): sending packet to 192.168.12.1 my_port 500 peer_port 500 (I) MM_SA_SETUP
*Mar  7 16:31:38.758: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar  7 16:31:38.758: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3 

*Mar  7 16:31:39.198: ISAKMP (0:0): received packet from 192.168.12.1 dport 500 sport 500 Global (I) MM_SA_SETUP
*Mar  7 16:31:39.202: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar  7 16:31:39.206: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4 

*Mar  7 16:31:39.210: ISAKMP:(0): processing KE payload. message ID = 0
*Mar  7 16:31:39.294: ISAKMP:(0): processing NONCE payload. message ID = 0
*Mar  7 16:31:39.298: ISAKMP:(0):found peer pre-shared key matching 192.168.12.1
*Mar  7 16:31:39.302: ISAKMP:(1001): processing vendor id payload
*Mar  7 16:31:39.302: ISAKMP:(1001): vendor ID is Unity
*Mar  7 16:31:39.302: ISAKMP:(1001): processing vendor id payload
*Mar  7 16:31:39.306: ISAKMP:(1001): vendor ID seems Unity/DPD but major 38 mismatch
*Mar  7 16:31:39.306: ISAKMP:(1001): vendor ID is XAUTH
*Mar  7 16:31:39.306: ISAKMP:(1001): processing vendor id payload
*Mar  7 16:31:39.306: ISAKMP:(1001): speaking to another IOS box!
*Mar  7 16:31:39.310: ISAKMP:(1001): processing vendor id payload
*Mar  7 16:31:39.310: ISAKMP:(1001):vendor ID seems Unity/DPD but hash mismatch
*Mar  7 16:31:39.310: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar  7 16:31:39.314: ISAKMP:(1001):Old State = IKE_I._MM4  New State = IKE_I_MM4 

*Mar  7 16:31:39.322: ISAKMP:(1001):Send initial contact
*Mar  7 16:31:39.322: ISAKMP:(1001):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
*Mar  7 16:31:39.322: ISAKMP (0:1001): ID payload 
        next-payload : 8
        type         : 1 
        address      : 192.168.23.3 
        protocol     : 17 
        port         : 500 
        length       : 12
*Mar  7 16:31:39.326: ISAKMP:(1001):Total payload length: 12
*Mar  7 16:31:39.330: ISAKMP:(1001): sending packet to 192.168.12.1 my_port 500 peer_port 500 (I) MM_KEY_EXCH
*Mar  7 16:31:39.334: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar  7 16:31:39.334: ISAKMP:(1001):Old State = IKE_I_MM4  New State = IKE_I_MM5 

*Mar  7 16:31:39.402: ISAKMP (0:1001): received packet from 192.168.12.1 dport 500 sport 500 Global (I) MM_KEY_EXCH
*Mar  7 16:31:39.406: ISAKMP:(1001): processing ID payload. message ID = 0
*Mar  7 16:31:39.406: ISAKMP (0:1001): ID payload 
        next-payload : 8
        type         : 1 
        address      : 192.168.12.1 
        protocol     : 17 
        port         : 500 
        length       : 12
*Mar  7 16:31:39.410: ISAKMP:(0):: peer matches *none* of the profiles
*Mar  7 16:31:39.410: ISAKMP:(1001): processing HASH payload. message ID = 0
*Mar  7 16:31:39.414: ISAKMP:received payload type 17
*Mar  7 16:31:39.414: ISAKMP:(1001): processing vendor id payload
*Mar  7 16:31:39.414: ISAKMP:(1001): vendor ID is DPD
*Mar  7 16:31:39.414: ISAKMP:(1001):SA authentication status:
        authenticated
*Mar  7 16:31:39.418: ISAKMP:(1001):SA has been authenticated with 192.168.12.1
*Mar  7 16:31:39.418: ISAKMP: Trying to insert a peer 192.168.23.3/192.168.12.1/500/,  and inserted successfully 657CC3B4.
*Mar  7 16:31:39.418: ISAKMP:(1001):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar  7 16:31:39.422: ISAKMP:(1001):Old State = IKE_I_MM5  New State = IKE_I_MM6 

*Mar  7 16:31:39.430: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar  7 16:31:39.430: ISAKMP:(1001):O.ld State = IKE_I_MM6  New State = IKE_I_MM6 

*Mar  7 16:31:39.438: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar  7 16:31:39.438: ISAKMP:(1001):Old State = IKE_I_MM6  New State = IKE_P1_COMPLETE 

*Mar  7 16:31:39.446: ISAKMP:(1001):beginning Quick Mode exchange, M-ID of 1544969219
*Mar  7 16:31:39.446: ISAKMP:(1001):QM Initiator gets spi
*Mar  7 16:31:39.454: ISAKMP:(1001): sending packet to 192.168.12.1 my_port 500 peer_port 500 (I) QM_IDLE      
*Mar  7 16:31:39.458: ISAKMP:(1001):Node 1544969219, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
*Mar  7 16:31:39.458: ISAKMP:(1001):Old State = IKE_QM_READY  New State = IKE_QM_I_QM1
*Mar  7 16:31:39.458: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Mar  7 16:31:39.458: ISAKMP:(1001):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE 

*Mar  7 16:31:39.702: ISAKMP (0:1001): received packet from 192.168.12.1 dport 500 sport 500 Global (I) QM_IDLE      
*Mar  7 16:31:39.706: ISAKMP:(1001): processing HASH payload. message ID = 1544969219
*Mar  7 16:31:39.706: ISAKMP:(1001): processing SA payload. message ID = 1544969219
*Mar  7 16:31:39.710: ISAKMP:(1001):Checking IPSec proposal 1
*Mar  7 16:31:39.710: ISAKMP: transform 1, ESP_DES
*Mar  7 16:31:39.710: ISAKMP:   attributes in transform:
*Mar  7 16:31:39.710: ISAKMP:      SA life type in seconds
*Mar  7 16:31:39.710: ISAKMP:      SA life duration (basic) of 3600
*Mar  7 16:31:39.710: ISAKMP:      SA life type in kilobytes
*Mar  7 16:31:39.714: ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
*Mar  7 16:31:39.714: ISAKMP:      encaps is 1 (Tunnel)
*Mar  7 16:31:39.714: ISAKMP:      authenticator is HMAC-SHA
*Mar  7 16:31:39.718: ISAKMP:(1001):atts are acceptable.
*Mar  7 16:31:39.718: ISAKMP:(1001): processing NONCE payload. message ID = 1544969219
*Mar  7 16:31:39.722: ISAKMP:(1001): processing ID payload. message ID = 1544969219
*Mar  7 16:31:39.722: ISAKMP:(1001): processing ID payload. messag.e ID = 1544969219
*Mar  7 16:31:39.730: ISAKMP:(1001): Creating IPSec SAs
*Mar  7 16:31:39.730:         inbound SA from 192.168.12.1 to 192.168.23.3 (f/i)  0/ 0
        (proxy 172.16.10.1 to 172.16.11.1)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -