z/OS Communications Server: IP Messages Volume 2 (EZB, EZD)
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


EZD1920I

z/OS Communications Server: IP Messages Volume 2 (EZB, EZD)
SC27-3655-01

EZD1920I
Attempting an on-demand activation for IKE outbound UDP traffic from source_ipaddr port source_port to dest_ipaddr port dest_port using anchor filter filtername

Explanation

The Internet Key Exchange (IKE) daemon is attempting to negotiate an on-demand IPsec Security Association to protect outbound traffic on UDP ports 500 or 4500. The IKE daemon might use either port 500 or port 4500 when it is negotiating Security Associations.

This is not an error condition, but it is a possible indication of a misconfiguration. Usually, IKE daemon UDP traffic is allowed without IPsec protection. If the IKE daemon must negotiate a Security Association to protect its own messages, then it is likely that the negotiation will fail. If the negotiation fails, the IKE daemon issues subsequent syslog messages to indicate that the Security Association negotiation failed.

See the steps for configuring IP security policy in z/OS Communications Server: IP Configuration Guide for information.

In the message text:
source_ipaddr
The source IP address.
source_port
The source port.
dest_ipaddr
The destination IP address.
dest_port
The destination port.
filtername
The name of matching anchor filter rule.

System action

The IKE daemon continues processing.

Operator response

None.

System programmer response

None.

User response

Not applicable.

Problem determination

None.

Source

z/OS® Communications Server TCP/IP: IKE daemon

Module

anchor_ureq.cpp

Routing code

*

Descriptor code

*

Automation

Not applicable.

Example

EZD1920I Attempting an on-demand activation for IKE outbound UDP traffic from  8.1.1.1 
         port 500 to 9.2.2.2 port 500 using anchor filter tunnel_1

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014