Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ciscoasa(config)# sh crypto ipsec sa
- interface: outside
- Crypto map tag: _vpnc_cm, seq num: 10, local addr: 192.168.1.1
- access-list _vpnc_acl extended permit ip host 192.168.1.1 host X.X.X.149
- local ident (addr/mask/prot/port): (192.168.1.1/255.255.255.255/0/0)
- remote ident (addr/mask/prot/port): (X.X.X.149/255.255.255.255/0/0)
- current_peer: X.X.X.149, username: X.X.X.149
- dynamic allocated peer ip: 0.0.0.0
- #pkts encaps: 15, #pkts encrypt: 15, #pkts digest: 15
- #pkts decaps: 15, #pkts decrypt: 15, #pkts verify: 15
- #pkts compressed: 0, #pkts decompressed: 0
- #pkts not compressed: 15, #pkts comp failed: 0, #pkts decomp failed: 0
- #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
- #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
- #TFC rcvd: 0, #TFC sent: 0
- #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
- #send errors: 0, #recv errors: 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement