A network administrator troubleshoots a VPN issue and suspects an IKE Crypto mismatch between peers.
Where can the administrator find the corresponding logs after running a test command to initiate the VPN?
A network administrator troubleshoots a VPN issue and suspects an IKE Crypto mismatch between peers.
Where can the administrator find the corresponding logs after running a test command to initiate the VPN?
When troubleshooting a VPN issue, particularly for an IKE Crypto mismatch, the most relevant information will be in the system logs. These logs contain entries related to system events, including VPN negotiation processes such as IKE (Internet Key Exchange). This is where detailed information about the failure would be recorded, enabling the network administrator to identify and resolve the mismatch.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PORsCAO
B Into the System logs
B is correct