Академический Документы
Профессиональный Документы
Культура Документы
Check for interesting traffic to initiate tunnel, check crypto ACLs for hit
Verify that the IKE policies (encr, auth, DH) are matching
counts
These are the current IKE/IPSec debugs available; the highlighted ones are the
most useful typically
The router will perform conditional debugging only after at least one of the global
crypto debug commandsdebug crypto isakmp, debug crypto ipsec, or debug crypto
enginehas been enabled; thi s requirement helps to ensure that the performance of the
router will not be impacted when conditional debugging is not being used
show crypto debug-condition [ all | peer | fvrf | ivrf | isakmp | username | connid
| spi ]