Hi Jimmy, *Mar 16 21:04:03.597: ISAKMP:(0):: peer matches *none* of the profiles
You tried another ISAKMP policy? Cheers Simon Am 16.03.2010 um 22:04 schrieb ccie_security-requ...@onlinestudylist.com: > Send CCIE_Security mailing list submissions to > ccie_security@onlinestudylist.com > > To subscribe or unsubscribe via the World Wide Web, visit > http://onlinestudylist.com/mailman/listinfo/ccie_security > or, via email, send a message with subject or body 'help' to > ccie_security-requ...@onlinestudylist.com > > You can reach the person managing the list at > ccie_security-ow...@onlinestudylist.com > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of CCIE_Security digest..." > > > Today's Topics: > > 1. problem protecting gre-tunnel with ipsec profile (Jimmy Larsson) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Tue, 16 Mar 2010 22:04:34 +0100 > From: Jimmy Larsson <ji...@kvistofta.nu> > Subject: [OSL | CCIE_Security] problem protecting gre-tunnel with > ipsec profile > To: ccie_security@onlinestudylist.com > Message-ID: > <4ad050741003161404g745b4acg54f7d8d8609a3...@mail.gmail.com> > Content-Type: text/plain; charset="iso-8859-1" > > Hi there > > In my home lab I?ve setup a GRE-tunnel between two routers. It works fine > until I apply the protection of the tunnel-interface. The the tunnel goes > down without me finding out why. > > Any idea? The configs looks like this: > > R1: > crypto isakmp policy 10 > encr aes > authentication pre-share > group 2 > crypto isakmp key cisco address 10.10.30.3 > ! > ! > crypto ipsec transform-set TSET esp-aes esp-sha-hmac > mode transport > ! > crypto ipsec profile IPSECPROF > set transform-set TSET > set pfs group2 > ! > interface Tunnel0 > ip address 10.99.99.1 255.255.255.0 > keepalive 2 3 > tunnel source FastEthernet0.11 > tunnel destination 10.10.30.3 > ! > > R3: > crypto isakmp policy 10 > encr aes > authentication pre-share > group 2 > crypto isakmp key cisco address 10.10.11.1 > ! > ! > crypto ipsec transform-set TSET esp-aes esp-sha-hmac > mode transport > ! > crypto ipsec profile IPSECPROF > set transform-set TSET > set pfs group2 > ! > interface Tunnel0 > ip address 10.99.99.3 255.255.255.0 > keepalive 2 3 > tunnel source FastEthernet0.30 > tunnel destination 10.10.11.1 > ! > > This happens when I add the "tunnel prot ipsec prof IPSECPROF" on both > routers: > > r1(config-if)#tunnel protection ipsec profile IPSECPROF > r1(config-if)# > *Mar 16 21:04:03.501: insert of map into mapdb AVL failed, map + ace pair > already exists on the mapdb > *Mar 16 21:04:03.505: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON > *Mar 16 21:04:03.505: IPSEC(recalculate_mtu): reset sadb_root 84106DF0 mtu > to 1500 > *Mar 16 21:04:03.505: IPSEC(sa_request): , > (key eng. msg.) OUTBOUND local= 10.10.11.1, remote= 10.10.30.3, > local_proxy= 10.10.11.1/255.255.255.255/47/0 (type=1), > remote_proxy= 10.10.30.3/255.255.255.255/47/0 (type=1), > protocol= ESP, transform= esp-aes esp-sha-hmac (Transport), > lifedur= 3600s and 4608000kb, > spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0 > *Mar 16 21:04:03.505: ISAKMP:(0): SA request profile is (NULL) > *Mar 16 21:04:03.505: ISAKMP: Created a peer struct for 10.10.30.3, peer > port 500 > *Mar 16 21:04:03.505: ISAKMP: New peer created peer = 0x855B6B34 peer_handle > = 0x8000000B > *Mar 16 21:04:03.505: ISAKMP: Locking peer struct 0x855B6B34, refcount 1 for > isakmp_initiator > *Mar 16 21:04:03.505: ISAKMP: local port 500, remote port 500 > *Mar 16 21:04:03.505: ISAKMP: set new node 0 to QM_IDLE > *Mar 16 21:04:03.505: ISAKMP: Find a dup sa in the avl tree during calling > isadb_insert sa = 8510B76C > *Mar 16 21:04:03.505: ISAKMP:(0):Can not start Aggressive mode, trying Main > mode. > *Mar 16 21:04:03.505: ISAKMP:(0):found peer pre-shared key matching > 10.10.30.3 > *Mar 16 21:04:03.505: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID > *Mar 16 21:04:03.505: ISAKMP:(0): constructed NAT-T vendor-07 ID > *Mar 16 21:04:03.505: ISAKMP:(0): constructed NAT-T vendor-03 ID > *Mar 16 21:04:03.505: ISAKMP:(0): constructed NAT-T vendor-02 ID > *Mar 16 21:04:03.505: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM > *Mar 16 21:04:03.505: ISAKMP:(0):Old State = IKE_READY New State = > IKE_I_MM1 > > *Mar 16 21:04:03.505: ISAKMP:(0): beginning Main Mode exchange > *Mar 16 21:04:03.505: ISAKMP:(0): sending packet to 10.10.30.3 my_port 500 > peer_port 500 (I) MM_NO_STATE > *Mar 16 21:04:03.505: ISAKMP:(0):Sending an IKE IPv4 Packet. > *Mar 16 21:04:03.513: ISAKMP (0): received packet from 10.10.30.3 dport 500 > sport 500 Global (I) MM_NO_STATE > *Mar 16 21:04:03.513: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH > *Mar 16 21:04:03.513: ISAKMP:(0):Old State = IKE_I_MM1 New State = > IKE_I_MM2 > > *Mar 16 21:04:03.517: ISAKMP:(0): processing SA payload. message ID = 0 > *Mar 16 21:04:03.517: ISAKMP:(0): processing vendor id payload > *Mar 16 21:04:03.517: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 > mismatch > *Mar 16 21:04:03.517: ISAKMP (0): vendor ID is NAT-T RFC 3947 > *Mar 16 21:04:03.517: ISAKMP:(0):found peer pre-shared key matching > 10.10.30.3 > *Mar 16 21:04:03.517: ISAKMP:(0): local preshared key found > *Mar 16 21:04:03.517: ISAKMP : Scanning profiles for xauth ... > *Mar 16 21:04:03.517: ISAKMP:(0):Checking ISAKMP transform 1 against > priority 10 policy > *Mar 16 21:04:03.517: ISAKMP: encryption AES-CBC > *Mar 16 21:04:03.517: ISAKMP: keylength of 128 > *Mar 16 21:04:03.517: ISAKMP: hash SHA > *Mar 16 21:04:03.517: ISAKMP: default group 2 > *Mar 16 21:04:03.517: ISAKMP: auth pre-share > *Mar 16 21:04:03.517: ISAKMP: life type in seconds > *Mar 16 21:04:03.517: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 > 0x80 > *Mar 16 21:04:03.517: ISAKMP:(0):atts are acceptable. Next payload is 0 > *Mar 16 21:04:03.517: ISAKMP:(0):Acceptable atts:actual life: 0 > *Mar 16 21:04:03.517: ISAKMP:(0):Acceptable atts:life: 0 > *Mar 16 21:04:03.517: ISAKMP:(0):Fill atts in sa vpi_length:4 > *Mar 16 21:04:03.517: ISAKMP:(0):Fill atts in sa life_in_seconds:86400 > *Mar 16 21:04:03.517: ISAKMP:(0):Returning Actual lifetime: 86400 > *Mar 16 21:04:03.517: ISAKMP:(0)::Started lifetime timer: 86400. > > *Mar 16 21:04:03.517: ISAKMP:(0): processing vendor id payload > *Mar 16 21:04:03.517: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 > mismatch > *Mar 16 21:04:03.517: ISAKMP (0): vendor ID is NAT-T RFC 3947 > *Mar 16 21:04:03.517: ISAKMP:(0):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_MAIN_MODE > *Mar 16 21:04:03.517: ISAKMP:(0):Old State = IKE_I_MM2 New State = > IKE_I_MM2 > > *Mar 16 21:04:03.517: ISAKMP:(0): sending packet to 10.10.30.3 my_port 500 > peer_port 500 (I) MM_SA_SETUP > *Mar 16 21:04:03.517: ISAKMP:(0):Sending an IKE IPv4 Packet. > *Mar 16 21:04:03.517: ISAKMP:(0):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_COMPLETE > *Mar 16 21:04:03.517: ISAKMP:(0):Old State = IKE_I_MM2 New State = > IKE_I_MM3 > > *Mar 16 21:04:03.553: ISAKMP (0): received packet from 10.10.30.3 dport 500 > sport 500 Global (I) MM_SA_SETUP > *Mar 16 21:04:03.553: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH > *Mar 16 21:04:03.553: ISAKMP:(0):Old State = IKE_I_MM3 New State = > IKE_I_MM4 > > *Mar 16 21:04:03.553: ISAKMP:(0): processing KE payload. message ID = 0 > *Mar 16 21:04:03.585: ISAKMP:(0): processing NONCE payload. message ID = 0 > *Mar 16 21:04:03.585: ISAKMP:(0):found peer pre-shared key matching > 10.10.30.3 > *Mar 16 21:04:03.585: ISAKMP:(2006): processing vendor id payload > *Mar 16 21:04:03.585: ISAKMP:(2006): vendor ID is Unity > *Mar 16 21:04:03.585: ISAKMP:(2006): processing vendor id payload > *Mar 16 21:04:03.589: ISAKMP:(2006): vendor ID is DPD > *Mar 16 21:04:03.589: ISAKMP:(2006): processing vendor id payload > *Mar 16 21:04:03.589: ISAKMP:(2006): speaking to another IOS box! > *Mar 16 21:04:03.589: ISAKMP:received payload type 20 > *Mar 16 21:04:03.589: ISAKMP (2006): His hash no match - this node outside > NAT > *Mar 16 21:04:03.589: ISAKMP:received payload type 20 > *Mar 16 21:04:03.589: ISAKMP (2006): No NAT Found for self or peer > *Mar 16 21:04:03.589: ISAKMP:(2006):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_MAIN_MODE > *Mar 16 21:04:03.589: ISAKMP:(2006):Old State = IKE_I_MM4 New State = > IKE_I_MM4 > > *Mar 16 21:04:03.589: ISAKMP:(2006):Send initial contact > *Mar 16 21:04:03.589: ISAKMP:(2006):SA is doing pre-shared key > authentication using id type ID_IPV4_ADDR > *Mar 16 21:04:03.589: ISAKMP (2006): ID payload > next-payload : 8 > type : 1 > address : 10.10.11.1 > protocol : 17 > port : 500 > length : 12 > *Mar 16 21:04:03.589: ISAKMP:(2006):Total payload length: 12 > *Mar 16 21:04:03.589: ISAKMP:(2006): sending packet to 10.10.30.3 my_port > 500 peer_port 500 (I) MM_KEY_EXCH > *Mar 16 21:04:03.589: ISAKMP:(2006):Sending an IKE IPv4 Packet. > *Mar 16 21:04:03.589: ISAKMP:(2006):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_COMPLETE > *Mar 16 21:04:03.589: ISAKMP:(2006):Old State = IKE_I_MM4 New State = > IKE_I_MM5 > > *Mar 16 21:04:03.597: ISAKMP (2006): received packet from 10.10.30.3 dport > 500 sport 500 Global (I) MM_KEY_EXCH > *Mar 16 21:04:03.597: ISAKMP:(2006): processing ID payload. message ID = 0 > *Mar 16 21:04:03.597: ISAKMP (2006): ID payload > next-payload : 8 > type : 1 > address : 10.10.30.3 > protocol : 17 > port : 500 > length : 12 > *Mar 16 21:04:03.597: ISAKMP:(0):: peer matches *none* of the profiles > *Mar 16 21:04:03.597: ISAKMP:(2006): processing HASH payload. message ID = 0 > *Mar 16 21:04:03.597: ISAKMP:(2006):SA authentication status: > authenticated > *Mar 16 21:04:03.597: ISAKMP:(2006):SA has been authenticated with > 10.10.30.3 > *Mar 16 21:04:03.597: ISAKMP: Trying to insert a peer > 10.10.11.1/10.10.30.3/500/, and inserted successfully 855B6B34. > *Mar 16 21:04:03.597: ISAKMP:(2006):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH > *Mar 16 21:04:03.597: ISAKMP:(2006):Old State = IKE_I_MM5 New State = > IKE_I_MM6 > > *Mar 16 21:04:03.597: ISAKMP:(2006):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_MAIN_MODE > *Mar 16 21:04:03.597: ISAKMP:(2006):Old State = IKE_I_MM6 New State = > IKE_I_MM6 > > *Mar 16 21:04:03.597: ISAKMP:(2006):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_COMPLETE > *Mar 16 21:04:03.597: ISAKMP:(2006):Old State = IKE_I_MM6 New State = > IKE_P1_COMPLETE > > *Mar 16 21:04:03.601: ISAKMP:(2006):beginning Quick Mode exchange, M-ID of > -1148211798 > *Mar 16 21:04:03.601: ISAKMP:(2006):QM Initiator gets spi > *Mar 16 21:04:03.601: ISAKMP:(2006): sending packet to 10.10.30.3 my_port > 500 peer_port 500 (I) QM_IDLE > *Mar 16 21:04:03.601: ISAKMP:(2006):Sending an IKE IPv4 Packet. > *Mar 16 21:04:03.601: ISAKMP:(2006):Node -1148211798, Input = > IKE_MESG_INTERNAL, IKE_INIT_QM > *Mar 16 21:04:03.601: ISAKMP:(2006):Old State = IKE_QM_READY New State = > IKE_QM_I_QM1 > *Mar 16 21:04:03.601: ISAKMP:(2006):Input = IKE_MESG_INTERNAL, > IKE_PHASE1_COMPLETE > *Mar 16 21:04:03.601: ISAKMP:(2006):Old State = IKE_P1_COMPLETE New State = > IKE_P1_COMPLETE > > *Mar 16 21:04:03.637: ISAKMP (2006): received packet from 10.10.30.3 dport > 500 sport 500 Global (I) QM_IDLE > *Mar 16 21:04:03.637: ISAKMP:(2006): processing HASH payload. message ID = > -1148211798 > *Mar 16 21:04:03.637: ISAKMP:(2006): processing SA payload. message ID = > -1148211798 > *Mar 16 21:04:03.637: ISAKMP:(2006):Checking IPSec proposal 1 > *Mar 16 21:04:03.637: ISAKMP: transform 1, ESP_AES > *Mar 16 21:04:03.637: ISAKMP: attributes in transform: > *Mar 16 21:04:03.637: ISAKMP: encaps is 2 (Transport) > *Mar 16 21:04:03.637: ISAKMP: SA life type in seconds > *Mar 16 21:04:03.637: ISAKMP: SA life duration (basic) of 3600 > *Mar 16 21:04:03.637: ISAKMP: SA life type in kilobytes > *Mar 16 21:04:03.637: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 > 0x0 > *Mar 16 21:04:03.637: ISAKMP: authenticator is HMAC-SHA > *Mar 16 21:04:03.637: ISAKMP: key length is 128 > *Mar 16 21:04:03.637: ISAKMP: group is 2 > *Mar 16 21:04:03.637: ISAKMP:(2006):atts are acceptable. > *Mar 16 21:04:03.641: IPSEC(validate_proposal_request): proposal part #1 > *Mar 16 21:04:03.641: IPSEC(validate_proposal_request): proposal part #1, > (key eng. msg.) INBOUND local= 10.10.11.1, remote= 10.10.30.3, > local_proxy= 10.10.11.1/255.255.255.255/47/0 (type=1), > remote_proxy= 10.10.30.3/255.255.255.255/47/0 (type=1), > protocol= ESP, transform= NONE (Transport), > lifedur= 0s and 0kb, > spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0 > *Mar 16 21:04:03.641: Crypto mapdb : proxy_match > src addr : 10.10.11.1 > dst addr : 10.10.30.3 > protocol : 47 > src port : 0 > dst port : 0 > *Mar 16 21:04:03.641: ISAKMP:(2006): processing NONCE payload. message ID = > -1148211798 > *Mar 16 21:04:03.641: ISAKMP:(2006): processing KE payload. message ID = > -1148211798 > *Mar 16 21:04:03.669: ISAKMP:(2006): processing ID payload. message ID = > -1148211798 > *Mar 16 21:04:03.669: ISAKMP:(2006): processing ID payload. message ID = > -1148211798 > *Mar 16 21:04:03.669: ISAKMP:(2006): Creating IPSec SAs > *Mar 16 21:04:03.673: inbound SA from 10.10.30.3 to 10.10.11.1 (f/i) > 0/ 0 > (proxy 10.10.30.3 to 10.10.11.1) > *Mar 16 21:04:03.673: has spi 0x8581A7C2 and conn_id 0 > *Mar 16 21:04:03.673: lifetime of 3600 seconds > *Mar 16 21:04:03.673: lifetime of 4608000 kilobytes > *Mar 16 21:04:03.673: outbound SA from 10.10.11.1 to 10.10.30.3 > (f/i) 0/0 > (proxy 10.10.11.1 to 10.10.30.3) > *Mar 16 21:04:03.673: has spi 0xD04390C8 and conn_id 0 > *Mar 16 21:04:03.673: lifetime of 3600 seconds > *Mar 16 21:04:03.673: lifetime of 4608000 kilobytes > *Mar 16 21:04:03.673: ISAKMP:(2006): sending packet to 10.10.30.3 my_port > 500 peer_port 500 (I) QM_IDLE > *Mar 16 21:04:03.673: ISAKMP:(2006):Sending an IKE IPv4 Packet. > *Mar 16 21:04:03.673: ISAKMP:(2006):deleting node -1148211798 error FALSE > reason "No Error" > *Mar 16 21:04:03.673: ISAKMP:(2006):Node -1148211798, Input = > IKE_MESG_FROM_PEER, IKE_QM_EXCH > *Mar 16 21:04:03.673: ISAKMP:(2006):Old State = IKE_QM_I_QM1 New State = > IKE_QM_PHASE2_COMPLETE > *Mar 16 21:04:03.673: IPSEC(key_engine): got a queue event with 1 KMI > message(s) > *Mar 16 21:04:03.673: Crypto mapdb : proxy_match > src addr : 10.10.11.1 > dst addr : 10.10.30.3 > protocol : 47 > src port : 0 > dst port : 0 > *Mar 16 21:04:03.673: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting > with the same proxies and peer 10.10.30.3 > *Mar 16 21:04:03.673: IPSEC(policy_db_add_ident): src 10.10.11.1, dest > 10.10.30.3, dest_port 0 > > *Mar 16 21:04:03.673: IPSEC(create_sa): sa created, > (sa) sa_dest= 10.10.11.1, sa_proto= 50, > sa_spi= 0x8581A7C2(2239866818), > sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 11 > sa_lifetime(k/sec)= (4605417/3600) > *Mar 16 21:04:03.673: IPSEC(create_sa): sa created, > (sa) sa_dest= 10.10.30.3, sa_proto= 50, > sa_spi= 0xD04390C8(3494088904), > sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 12 > sa_lifetime(k/sec)= (4605417/3600) > *Mar 16 21:04:03.673: IPSEC(update_current_outbound_sa): updated peer > 10.10.30.3 current outbound sa to SPI D04390C8 > *Mar 16 21:04:03.673: IPSEC(crypto_ipsec_update_ident_tunnel_decap_oce): > updating Tunnel0 ident 8410B0B4 with tun_decap_oce 840BA250 > *Mar 16 21:04:05.021: %CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd packet not an > IPSEC packet. (ip) vrf/dest_addr= /10.10.11.1, src_addr= 10.10.30.3, prot= > 47 > *Mar 16 21:04:07.025: ISAKMP:(2005):purging node 1766298552 > *Mar 16 21:04:07.029: ISAKMP:(2005):purging node -679064078 > *Mar 16 21:04:12.021: %LINEPROTO-5-UPDOWN: Line protocol on Interface > Tunnel0, changed state to down > *Mar 16 21:04:12.025: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 11: Neighbor 10.99.99.3 > (Tunnel0) is down: interface down > *Mar 16 21:04:13.017: ISAKMP:(0):purging node 1244832784 > *Mar 16 21:04:17.029: ISAKMP:(2005):purging SA., sa=84D96844, delme=84D96844 > *Mar 16 21:04:23.017: ISAKMP:(0):purging SA., sa=8510ADA8, delme=8510ADA8 > *Mar 16 21:04:41.697: ISAKMP (2006): received packet from 10.10.30.3 dport > 500 sport 500 Global (I) QM_IDLE > *Mar 16 21:04:41.697: ISAKMP: set new node 119284 to QM_IDLE > *Mar 16 21:04:41.697: ISAKMP:(2006): processing HASH payload. message ID = > 119284 > *Mar 16 21:04:41.697: ISAKMP:(2006): processing DELETE payload. message ID = > 119284 > *Mar 16 21:04:41.697: ISAKMP:(2006):peer does not do paranoid keepalives. > > *Mar 16 21:04:41.697: ISAKMP:(2006):deleting node 119284 error FALSE reason > "Informational (in) state 1" > *Mar 16 21:04:41.697: IPSEC(key_engine): got a queue event with 1 KMI > message(s) > *Mar 16 21:04:41.697: IPSEC(key_engine_delete_sas): rec'd delete notify from > ISAKMP > *Mar 16 21:04:41.697: IPSEC(key_engine_delete_sas): delete SA with spi > 0xD04390C8 proto 50 for 10.10.30.3 > *Mar 16 21:04:41.701: IPSEC(delete_sa): deleting SA, > (sa) sa_dest= 10.10.11.1, sa_proto= 50, > sa_spi= 0x8581A7C2(2239866818), > sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 11 > sa_lifetime(k/sec)= (4605417/3600), > (identity) local= 10.10.11.1, remote= 10.10.30.3, > local_proxy= 10.10.11.1/255.255.255.255/47/0 (type=1), > remote_proxy= 10.10.30.3/255.255.255.255/47/0 (type=1) > *Mar 16 21:04:41.701: IPSEC(update_current_outbound_sa): updated peer > 10.10.30.3 current outbound sa to SPI 0 > *Mar 16 21:04:41.701: IPSEC(delete_sa): deleting SA, > (sa) sa_dest= 10.10.30.3, sa_proto= 50, > sa_spi= 0xD04390C8(3494088904), > sa_trans= esp-aes esp-sha-hmac , sa_conn_id= 12 > sa_lifetime(k/sec)= (4605417/3600), > (identity) local= 10.10.11.1, remote= 10.10.30.3, > local_proxy= 10.10.11.1/255.255.255.255/47/0 (type=1), > remote_proxy= 10.10.30.3/255.255.255.255/47/0 (type=1) > *Mar 16 21:04:41.701: ISAKMP (2006): received packet from 10.10.30.3 dport > 500 sport 500 Global (I) QM_IDLE > *Mar 16 21:04:41.701: ISAKMP: set new node 542896453 to QM_IDLE > *Mar 16 21:04:41.701: ISAKMP:(2006): processing HASH payload. message ID = > 542896453 > *Mar 16 21:04:41.701: ISAKMP:received payload type 18 > *Mar 16 21:04:41.701: ISAKMP:(2006):Processing delete with reason payload > *Mar 16 21:04:41.701: ISAKMP:(2006):delete doi = 1 > *Mar 16 21:04:41.701: ISAKMP:(2006):delete protocol id = 1 > *Mar 16 21:04:41.701: ISAKMP:(2006):delete spi_size = 16 > *Mar 16 21:04:41.701: ISAKMP:(2006):delete num spis = 1 > *Mar 16 21:04:41.701: ISAKMP:(2006):delete_reason = 6 > *Mar 16 21:04:41.701: ISAKMP:(2006): processing DELETE_WITH_REASON payload, > message ID = 542896453, reason: Unknown delete reason! > *Mar 16 21:04:41.701: ISAKMP:(2006):peer does not do paranoid keepalives. > > *Mar 16 21:04:41.701: ISAKMP:(2006):deleting SA reason "P1 delete notify > (in)" state (I) QM_IDLE (peer 10.10.30.3) > *Mar 16 21:04:41.701: ISAKMP:(2006):deleting node 542896453 error FALSE > reason "Informational (in) state 1" > *Mar 16 21:04:41.705: ISAKMP: set new node 1544040584 to QM_IDLE > *Mar 16 21:04:41.705: ISAKMP:(2006): sending packet to 10.10.30.3 my_port > 500 peer_port 500 (I) QM_IDLE > *Mar 16 21:04:41.705: ISAKMP:(2006):Sending an IKE IPv4 Packet. > *Mar 16 21:04:41.705: ISAKMP:(2006):purging node 1544040584 > *Mar 16 21:04:41.705: ISAKMP:(2006):Input = IKE_MESG_INTERNAL, > IKE_PHASE1_DEL > *Mar 16 21:04:41.705: ISAKMP:(2006):Old State = IKE_P1_COMPLETE New State = > IKE_DEST_SA > > *Mar 16 21:04:41.705: ISAKMP:(2006):deleting SA reason "P1 delete notify > (in)" state (I) QM_IDLE (peer 10.10.30.3) > *Mar 16 21:04:41.705: ISAKMP:(0):Can't decrement IKE Call Admission Control > stat outgoing_active since it's already 0. > *Mar 16 21:04:41.705: ISAKMP: Unlocking peer struct 0x855B6B34 for > isadb_mark_sa_deleted(), count 0 > *Mar 16 21:04:41.705: ISAKMP: Deleting peer node by peer_reap for 10.10.30.3: > 855B6B34 > *Mar 16 21:04:41.705: ISAKMP:(2006):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH > *Mar 16 21:04:41.705: ISAKMP:(2006):Old State = IKE_DEST_SA New State = > IKE_DEST_SA > > *Mar 16 21:04:41.705: IPSEC(key_engine): got a queue event with 1 KMI > message(s) > *Mar 16 21:04:42.021: IPSEC(cleanup_tun_decap_oce): unlock and null out > tun_decap_oce 840BA250 from ident 8410B0B4 > *Mar 16 21:04:42.021: del_node src 10.10.11.1:500 dst 10.10.30.3:500 fvrf > 0x0, ivrf 0x0 > *Mar 16 21:04:42.021: ISAKMP:(2006):peer does not do paranoid keepalives. > > *Mar 16 21:04:42.021: del_node src 10.10.11.1:500 dst 10.10.30.3:500 fvrf > 0x0, ivrf 0x0 > *Mar 16 21:04:42.021: ISAKMP:(2006):peer does not do paranoid keepalives. > > *Mar 16 21:04:42.021: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF > > As far as I can see phase1 goes fine (QM_IDLE) anf ipsec debugging does?nt > show me anything bad. In fact it takes a few seconds before the tunnel goes > down. But why? What am I doing wrong? > > Full configs are attached... > > Br Jimmy > > > > > -- > ------- > Jimmy Larsson > Ryavagen 173 > s-26030 Vallakra > Sweden > http://blogg.kvistofta.nu > ------- > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: > http://onlinestudylist.com/pipermail/ccie_security/attachments/20100316/a0a98372/attachment.htm > > -------------- next part -------------- > r1#sh run > Building configuration... > > Current configuration : 1984 bytes > ! > version 12.4 > service timestamps debug datetime msec > service timestamps log datetime msec > no service password-encryption > ! > hostname r1 > ! > boot-start-marker > boot-end-marker > ! > logging message-counter syslog > ! > no aaa new-model > ! > ! > dot11 syslog > ip source-route > ! > ! > ! > ! > ip cef > no ip domain lookup > ip domain name kvistofta.nu > no ipv6 cef > ! > multilink bundle-name authenticated > ! > ! > ! > ! > ! > crypto isakmp policy 10 > encr aes > authentication pre-share > group 2 > crypto isakmp key cisco address 10.10.30.3 > ! > ! > crypto ipsec transform-set TSET esp-aes esp-sha-hmac > mode transport > ! > crypto ipsec profile IPSECPROF > set transform-set TSET > set pfs group2 > ! > archive > log config > hidekeys > ! > ! > ! > ! > ! > interface Loopback0 > ip address 10.1.1.1 255.255.255.255 > ! > interface Tunnel0 > ip address 10.99.99.1 255.255.255.0 > keepalive 2 3 > tunnel source FastEthernet0.11 > tunnel destination 10.10.30.3 > tunnel protection ipsec profile IPSECPROF > ! > interface FastEthernet0 > no ip address > duplex auto > speed auto > ! > interface FastEthernet0.10 > encapsulation dot1Q 10 > ip address 10.10.10.2 255.255.255.0 > ! > interface FastEthernet0.11 > encapsulation dot1Q 11 > ip address 10.10.11.1 255.255.255.0 > ! > interface FastEthernet1 > no ip address > shutdown > duplex auto > speed auto > ! > interface FastEthernet2 > ! > interface FastEthernet3 > ! > interface FastEthernet4 > ! > interface FastEthernet5 > ! > interface FastEthernet6 > ! > interface FastEthernet7 > ! > interface FastEthernet8 > ! > interface FastEthernet9 > ! > interface Vlan1 > no ip address > ! > interface Async1 > no ip address > encapsulation slip > ! > router eigrp 11 > network 10.10.10.0 0.0.0.255 > network 10.99.99.0 0.0.0.255 > no auto-summary > ! > ip forward-protocol nd > ip route 10.10.30.3 255.255.255.255 10.10.11.2 > no ip http server > no ip http secure-server > ! > ! > ! > ! > ! > ! > ! > ! > ! > control-plane > ! > alias exec siib sh ip int brie | excl unset|unassigned > alias exec srs sh run | sect > ! > line con 0 > line 1 > modem InOut > stopbits 1 > speed 115200 > flowcontrol hardware > line aux 0 > line vty 0 4 > login > ! > end > > r1# > -------------- next part -------------- > r3#sh run > Building configuration... > > Current configuration : 2117 bytes > ! > version 12.4 > service timestamps debug datetime msec > service timestamps log datetime msec > no service password-encryption > ! > hostname r3 > ! > boot-start-marker > boot-end-marker > ! > logging message-counter syslog > ! > no aaa new-model > clock timezone gmt+1 1 > ! > ! > dot11 syslog > ip source-route > ! > ! > ! > ! > ip cef > no ip domain lookup > no ipv6 cef > ! > multilink bundle-name authenticated > ! > ! > ! > ! > ! > crypto isakmp policy 10 > encr aes > authentication pre-share > group 2 > crypto isakmp key cisco address 10.10.11.1 > ! > ! > crypto ipsec transform-set TSET esp-aes esp-sha-hmac > mode transport > ! > crypto ipsec profile IPSECPROF > set transform-set TSET > set pfs group2 > ! > crypto ipsec profile PROF1 > ! > archive > log config > hidekeys > ! > ! > ! > ! > ! > interface Loopback0 > ip address 10.3.3.3 255.255.255.255 > ! > interface Tunnel0 > ip address 10.99.99.3 255.255.255.0 > keepalive 2 3 > tunnel source FastEthernet0.30 > tunnel destination 10.10.11.1 > tunnel protection ipsec profile IPSECPROF > ! > interface FastEthernet0 > no ip address > duplex auto > speed auto > ! > interface FastEthernet0.30 > encapsulation dot1Q 30 > ip address 10.10.30.3 255.255.255.0 > ! > interface FastEthernet1 > no ip address > shutdown > duplex auto > speed auto > ! > interface FastEthernet2 > ! > interface FastEthernet3 > ! > interface FastEthernet4 > ! > interface FastEthernet5 > ! > interface FastEthernet6 > ! > interface FastEthernet7 > ! > interface FastEthernet8 > ! > interface FastEthernet9 > ! > interface Vlan1 > no ip address > ! > interface Async1 > no ip address > encapsulation slip > ! > router eigrp 11 > network 10.3.3.3 0.0.0.0 > network 10.99.99.0 0.0.0.255 > no auto-summary > ! > ip forward-protocol nd > ip route 10.10.11.1 255.255.255.255 10.10.30.1 > no ip http server > no ip http secure-server > ! > ! > ! > ! > ! > ! > ! > ! > ! > control-plane > ! > alias exec siib sh ip int brie | excl unset|unassigned > alias exec srs sh run | sect > ! > line con 0 > line 1 > modem InOut > stopbits 1 > speed 115200 > flowcontrol hardware > line aux 0 > line vty 0 4 > login > ! > ntp authentication-key 1 md5 12495247315954510C7F007865 7 > ntp authenticate > ntp trusted-key 1 > ntp server 192.168.1.6 key 1 > ! > webvpn context Default_context > ssl authenticate verify all > ! > no inservice > ! > end > > r3# > > End of CCIE_Security Digest, Vol 45, Issue 68 > ********************************************* _______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com