Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
EZD1785I z/OS Communications Server: IP Messages Volume 2 (EZB, EZD) SC27-3655-01 |
|
EZD1785I Tentative KeyExchangeRule rule1 replaced
with final KeyExchangeRule rule2 ExplanationWhen an IKE negotiation is started, the KeyExchangePolicy statement is searched to locate a matching KeyExchangeRule statement for the negotiation. When this KeyExchangeRule statement is located, the local and remote security endpoint identities are not known with certainty, so this KeyExchangeRule statement is considered tentative until the local and remote identities are known. Then a new search for a KeyExchangeRule statement is performed to locate the final rule. The policy on the final KeyExchangeRule statement must be consistent with the policy chosen for the Security Association. For IKEv1, see the information about ISAKMP main mode limitations in z/OS Communications Server: IP Diagnosis Guide for more information about IKEv1. For IKEv2, see the information about key exchange limitations in z/OS Communications Server: IP Diagnosis Guide for more information about IKEv2. In
the message text:
System actionIKE daemon processing continues. Operator responseNone. System programmer responseNone. User responseNot applicable. Problem determinationNone. Sourcez/OS® Communications Server TCP/IP: IKE daemon ModuleCommonDomainOfInterpretation.cpp Routing code11 Descriptor code7 AutomationThis message is output to the syslog. Example
|
Copyright IBM Corporation 1990, 2014
|