Tunnel VPN IPSEC site 2 Site will not appear.

Hello Experts,

I was wondering if I can get help on creating an IPSEC VPN between a Cisco 2921 and ASA 550 x tunnel. Here is the config

See the race | s crypto

Crypto pki token removal timeout default 0

crypto ISAKMP policy 1

BA aes

preshared authentication

Group 2

lifetime 28800

ISAKMP crypto key address A.A.A.A xxxxxxxxxxxxxxxxxxxxxx

Crypto ipsec transform-set ESP-AES128-SHA aes - esp esp-sha-hmac

transport mode

ICQ-2-ILAND 1 ipsec-isakmp crypto map

defined by peer A.A.A.A

game of transformation-ESP-AES128-SHA

match the address iland_london_s2s_vpn

ICQ-2-ILAND crypto card

The config on the remote end has not been shared with me, so I don't know if I'm doing something wrong locally, or if the remote end is configured incorrectly.

The command Sh crypto isakmp its the following message

ISAKMP crypto to show his
IPv4 Crypto ISAKMP Security Association
DST CBC conn-State id
A.A.A.A B.B.B.B MM_NO_STATE 1231 ACTIVE (deleted)      

IPv6 Crypto ISAKMP Security Association

See the session encryption
Current state of the session crypto

Interface: GigabitEthernet0/0
The session state: DOWN-NEGOTIATION
Peer: Port A.A.A.A 500
IKEv1 SA: local B.B.B.Bremote 500 A.A.A.A500 inactive
IKEv1 SA: local B.B.B.Bremote 500 A.A.A.A500 inactive
FLOW IPSEC: allowed ip 10.20.111.0/255.255.255.0 10.120.1.0/255.255.255.0
Active sAs: 0, origin: card crypto
FLOW IPSEC: allowed ip 10.10.0.0/255.255.0.0 10.120.1.0/255.255.255.0
Active sAs: 0, origin: card crypto

The command debug crypto isakmp debug logs are listed below.

ISAKMP: (0): pre-shared key local found
08:51:52.019 on 6 Dec: ISAKMP: analysis of the profiles for xauth...
08:51:52.019 on 6 Dec: ISAKMP: (0): audit ISAKMP transform 1 against the policy of priority 1
08:51:52.019 on 6 Dec: ISAKMP: AES - CBC encryption
08:51:52.019 on 6 Dec: ISAKMP: keylength 128
08:51:52.019 on 6 Dec: ISAKMP: SHA hash
08:51:52.019 on 6 Dec: ISAKMP: group by default 2
08:51:52.019 on 6 Dec: ISAKMP: pre-shared key auth
08:51:52.019 on 6 Dec: ISAKMP: type of life in seconds
08:51:52.019 on 6 Dec: ISAKMP: life (basic) of 28800
08:51:52.019 on 6 Dec: ISAKMP: (0): atts are acceptable. Next payload is 0
08:51:52.019 on 6 Dec: ISAKMP: (0): Acceptable atts: real life: 0
08:51:52.019 on 6 Dec: ISAKMP: (0): Acceptable atts:life: 0
08:51:52.019 on 6 Dec: ISAKMP: (0): base life_in_seconds:28800
08:51:52.019 on 6 Dec: ISAKMP: (0): return real life: 28800
08:51:52.019 on 6 Dec: ISAKMP: (0): timer life Started: 28800.

DEC 6 08:51:52.019: ISAKMP: (0): load useful vendor id of treatment
DEC 6 08:51:52.019: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
DEC 6 08:51:52.019: ISAKMP: (0): provider ID is NAT - T v2
DEC 6 08:51:52.019: ISAKMP: (0): load useful vendor id of treatment
DEC 6 08:51:52.019: ISAKMP: (0): IKE frag vendor processing id payload
08:51:52.019 on 6 Dec: ISAKMP: (0): IKE Fragmentation support not enabled
08:51:52.019 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
08:51:52.019 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM2

DEC 6 08:51:52.019: ISAKMP: (0): A packet is sent. A.A.A my_port 500 peer_port 500 (I) MM_SA_SETUP
08:51:52.019 on 6 Dec: ISAKMP: (0): sending a packet IPv4 IKE.
08:51:52.019 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
08:51:52.019 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM3

08:51:52.155 on 6 Dec: ISAKMP (0): packet received dport 500 sport Global 500 (I) MM_SA_SETUP A.A.A.A
08:51:52.155 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
08:51:52.155 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM3 = IKE_I_MM4

DEC 6 08:51:52.155: ISAKMP: (0): processing KE payload. Message ID = 0
DEC 6 08:51:52.175: ISAKMP: (0): processing NONCE payload. Message ID = 0
08:51:52.175 on 6 Dec: ISAKMP: (0): pre-shared key found peer corresponding to A.A.A.A
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.175: ISAKMP: (1227): provider ID is the unit
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.175: ISAKMP: (1227): provider ID seems the unit/DPD but major incompatibility of 92
DEC 6 08:51:52.175: ISAKMP: (1227): provider ID is XAUTH
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.175: ISAKMP: (1227): addressing another box of IOS!
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
08:51:52.175 on 6 Dec: ISAKMP: (1227): vendor ID seems the unit/DPD but hash mismatch
08:51:52.175 on 6 Dec: ISAKMP: receives the payload type 20
08:51:52.175 on 6 Dec: ISAKMP (1227): sound not hash no match - this node outside NAT
08:51:52.175 on 6 Dec: ISAKMP: receives the payload type 20
08:51:52.175 on 6 Dec: ISAKMP (1227): No. NAT found for oneself or peer
08:51:52.175 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
08:51:52.179 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM4 = IKE_I_MM4

08:51:52.179 on 6 Dec: ISAKMP: (1227): send initial contact
08:51:52.179 on 6 Dec: ISAKMP: (1227): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication
08:51:52.179 on 6 Dec: ISAKMP (1227): payload ID
next payload: 8
type: 1
address: B.B.B.B
Protocol: 17
Port: 500
Length: 12
08:51:52.179 on 6 Dec: ISAKMP: (1227): the total payload length: 12
DEC 6 08:51:52.179: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) MM_KEY_EXCH
08:51:52.179 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
08:51:52.179 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
08:51:52.179 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM4 = IKE_I_MM5

08:51:52.315 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH A.A.A.A
DEC 6 08:51:52.315: ISAKMP: (1227): payload ID for treatment. Message ID = 0
08:51:52.315 on 6 Dec: ISAKMP (1227): payload ID
next payload: 8
type: 1
address: A.A.A.A
Protocol: 17
Port: 0
Length: 12
DEC 6 08:51:52.315: ISAKMP: (0): peer games * no * profiles
DEC 6 08:51:52.315: ISAKMP: (1227): HASH payload processing. Message ID = 0
08:51:52.315 on 6 Dec: ISAKMP: received payload type 17
DEC 6 08:51:52.315: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.315: ISAKMP: (1227): provider ID is DPD
08:51:52.315 on 6 Dec: ISAKMP: (1227): SA authentication status:
authenticated
08:51:52.315 on 6 Dec: ISAKMP: (1227): SA has been authenticated with A.A.A.A
08:51:52.315 on 6 Dec: ISAKMP: try to insert a B.B.B.B/A.A.A.A/500/ peer and inserted 2B79E8BC successfully.
08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM5 = IKE_I_MM6

08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM6 = IKE_I_MM6

08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM6 = IKE_P1_COMPLETE

08:51:52.315 on 6 Dec: ISAKMP: (1227): start Quick Mode Exchange, M - ID 1511581970
08:51:52.315 on 6 Dec: ISAKMP: (1227): initiator QM gets spi
DEC 6 08:51:52.315: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) QM_IDLE
08:51:52.315 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
08:51:52.315 on 6 Dec: ISAKMP: (1227): entrance, node 1511581970 = IKE_MESG_INTERNAL, IKE_INIT_QM
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_QM_READY = IKE_QM_I_QM1
08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE

08:51:52.455 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) QM_IDLE A.A.A.A
08:51:52.455 on 6 Dec: ISAKMP: node set-1740216573 to QM_IDLE
DEC 6 08:51:52.455: ISAKMP: (1227): HASH payload processing. Message ID = 2554750723
DEC 6 08:51:52.455: ISAKMP: (1227): treatment protocol NOTIFIER PROPOSAL_NOT_CHOSEN 3
0, message ID SPI = 2554750723, a = 0x2B78D574
08:51:52.455 on 6 Dec: ISAKMP: (1227): node-1740216573 error suppression FALSE reason 'informational (en) State 1.
08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE

08:51:52.455 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) QM_IDLE A.A.A.A
08:51:52.455 on 6 Dec: ISAKMP: node set 1297146574 to QM_IDLE
DEC 6 08:51:52.455: ISAKMP: (1227): HASH payload processing. Message ID = 1297146574
DEC 6 08:51:52.455: ISAKMP: (1227): treatment of payload to DELETE. Message ID = 1297146574
08:51:52.455 on 6 Dec: ISAKMP: (1227): peer does not paranoid KeepAlive.

08:51:52.455 on 6 Dec: ISAKMP: (1227): removal of HIS State "No reason" why (I) QM_IDLE (post A.A.A.A)
08:51:52.455 on 6 Dec: ISAKMP: (1227): error suppression node 1297146574 FALSE reason 'informational (en) State 1.
08:51:52.455 on 6 Dec: ISAKMP: node set-1178304129 to QM_IDLE
DEC 6 08:51:52.455: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) QM_IDLE
08:51:52.455 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
08:51:52.455 on 6 Dec: ISAKMP: (1227): purge the node-1178304129
08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_DEST_SA

08:51:52.455 on 6 Dec: ISAKMP: (1227): removal of HIS State "No reason" why (I) QM_IDLE (post A.A.A.A)
08:51:52.455 on 6 Dec: ISAKMP: Unlocking counterpart struct 0x2B79E8BC for isadb_mark_sa_deleted(), count 0
08:51:52.455 on 6 Dec: ISAKMP: delete peer node by peer_reap for A.A.A.A: 2B79E8BC
08:51:52.455 on 6 Dec: ISAKMP: (1227): error suppression node 1511581970 FALSE reason 'IKE deleted.
08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_DEST_SA = IKE_DEST_SA

Would appreciate any help you can provide.

Kind regards

Sidney Dsouza

The phase 2 does not complete since there is no visible SPI value. In addition, depending on your configuration Transport mode is configured for phase 2 However, debug displays the tunnel mode.

Thus, as suggested earlier to debug this further and find the root cause we need to match the configuration settings in Phase 2 with regard to the remote device.

Hope that helps.

Kind regards

Anuj

Tags: Cisco Security

Similar Questions

Maybe you are looking for