Cisco Cisco ASA 5585-X Adaptive Security Appliance 故障排查指南

下载
页码 8
      access−list 100 extended permit ip 192.168.1.0 255.255.255.0 172.16.10.0
        255.255.255.0
      local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
      remote ident (addr/mask/prot/port): (172.16.10.0/255.255.255.0/0/0)
      current_peer: 10.10.10.1
<...omitted...>
    inbound esp sas:
      spi: 0x00E847D8 (15222744)
transform: esp−aes−gcm esp−null−hmac no compression
         in use settings ={L2L, Tunnel, IKEv2, }
For further information on Ciscos implementation of Suite−B, refer to the Next Generation Encryption
White Paper.
Refer to the Next Generation Encryption Solution page to learn more about Ciscos implementation of Next
Generation Encryption.
Related Information
Next Generation Encryption White Paper
• 
Next Generation Encryption Solution Page
• 
Secure Shell (SSH)
• 
IPSec Negotiation/IKE Protocols
• 
ASA IKEv2 Debugs for Site−to−Site VPN with PSKs TechNote
• 
ASA IPSec and IKE debugs (IKEv1 Main Mode) Troubleshooting TechNote
• 
IOS IPSec and IKE debugs − IKEv1 Main Mode Troubleshooting TechNote
• 
ASA IPSec and IKE debugs − IKEv1 Aggressive Mode TechNote
• 
Technical Support & Documentation − Cisco Systems
• 
Contacts & Feedback | Help | Site Map
© 2014 − 2015 Cisco Systems, Inc. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks of
Cisco Systems, Inc.
Updated: Mar 26, 2013
Document ID: 116008