Here's the "debug dmvpn detail all" output from the DMVPN spoke

1254496: May 17 17:58:08.385 UTC: ISAKMP:(0): beginning Main Mode exchange
1254497: May 17 17:58:08.385 UTC: ISAKMP:(0): sending packet to
111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
1254498: May 17 17:58:08.389 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.

1254501: May 17 17:58:18.389 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE...
1254502: May 17 17:58:18.389 UTC: ISAKMP (0): incrementing error counter on
sa, attempt 1 of 5: retransmit phase 1
1254503: May 17 17:58:18.389 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE
1254504: May 17 17:58:18.389 UTC: ISAKMP:(0): sending packet to
111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
1254505: May 17 17:58:18.389 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.
1254506: May 17 17:58:23.649 UTC: NHRP: Setting retrans delay to 64 for nhs
dst 10..1.1.1
1254507: May 17 17:58:23.649 UTC: IPSEC-IFC MGRE/Tu100(
10.20.2.2/111.111.111.111): connection lookup returned 47C1E6EC

1254508: May 17 17:58:23.649 UTC: NHRP: Attempting to send packet via DEST
10.1.1.1
1254509: May 17 17:58:23.649 UTC: NHRP: NHRP successfully resolved 10.1.1.1
to NBMA 111.111.111.111
1254510: May 17 17:58:23.649 UTC: NHRP: Encapsulation succeeded.  Tunnel IP
addr 111.111.111.111
1254511: May 17 17:58:23.649 UTC: NHRP: Send Registration Request via
Tunnel100 vrf 0, packet size: 92
1254512: May 17 17:58:23.649 UTC: NHRP: 120 bytes out Tunnel100
1254513: May 17 17:58:23.649 UTC: NHRP-RATE: Retransmitting Registration
Request for 10.1.1.1, reqid 66217, (retrans ivl 64 sec)
1254514: May 17 17:58:27.161 UTC: NHRP-RATE: Tunnel100: Used 1

1254515: May 17 17:58:28.389 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE...
1254516: May 17 17:58:28.389 UTC: ISAKMP (0): incrementing error counter on
sa, attempt 2 of 5: retransmit phase 1
1254517: May 17 17:58:28.389 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE
1254518: May 17 17:58:28.389 UTC: ISAKMP:(0): sending packet to
111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
1254519: May 17 17:58:28.389 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.
1254520: May 17 17:58:38.386 UTC: IPSEC(key_engine): request timer fired:
count = 1,
  (identity) local= 10.20.2.2, remote= 111.111.111.111,
    local_proxy= 10.20.2.2/255.255.255.255/47/0 (type=1),
    remote_proxy= 111.111.111.111/255.255.255.255/47/0 (type=1)
1254521: May 17 17:58:38.386 UTC: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= 10.20.2.2, remote= 111.111.111.111,
    local_proxy= 10.20.2.2/255.255.255.255/47/0 (type=1),
    remote_proxy= 111.111.111.111/255.255.255.255/47/0 (type=1),
    protocol= ESP, transform= esp-aes esp-sha-hmac  (Transport),
    lifedur= 3600s and 4608000kb,
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0

1254522: May 17 17:58:38.386 UTC: ISAKMP: set new node 0 to QM_IDLE
1254523: May 17 17:58:38.386 UTC: ISAKMP:(0):SA is still budding. Attached
new ipsec request to it. (local 10.20.2.2, remote 111.111.111.111)
1254524: May 17 17:58:38.386 UTC: ISAKMP: Error while processing SA request:
Failed to initialize SA
1254525: May 17 17:58:38.386 UTC: ISAKMP: Error while processing KMI message
0, error 2.
1254526: May 17 17:58:38.390 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE...
1254527: May 17 17:58:38.390 UTC: ISAKMP (0): incrementing error counter on
sa, attempt 3 of 5: retransmit phase 1
1254528: May 17 17:58:38.390 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE
1254529: May 17 17:58:38.390 UTC: ISAKMP:(0): sending packet to
111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
1254530: May 17 17:58:38.390 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.

1254533: May 17 17:58:48.390 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE...
1254534: May 17 17:58:48.390 UTC: ISAKMP (0): incrementing error counter on
sa, attempt 4 of 5: retransmit phase 1
1254535: May 17 17:58:48.390 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE
1254536: May 17 17:58:48.390 UTC: ISAKMP:(0): sending packet to
111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
1254537: May 17 17:58:48.390 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.
1254538: May 17 17:58:58.002 UTC: ISAKMP:(0):purging node -271425466
1254539: May 17 17:58:58.002 UTC: ISAKMP:(0):purging node -1779998897
1254540: May 17 17:58:58.390 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE...
1254541: May 17 17:58:58.390 UTC: ISAKMP (0): incrementing error counter on
sa, attempt 5 of 5: retransmit phase 1
1254542: May 17 17:58:58.390 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE
1254543: May 17 17:58:58.390 UTC: ISAKMP:(0): sending packet to
111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
1254544: May 17 17:58:58.390 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.
1254545: May 17 17:59:08.003 UTC: ISAKMP:(0):purging SA., sa=49BF8494,
delme=49BF8494
1254546: May 17 17:59:08.387 UTC: IPSEC(key_engine): request timer fired:
count = 2,
  (identity) local= 10.20.2.2, remote= 111.111.111.111,
    local_proxy= 10.20.2.2/255.255.255.255/47/0 (type=1),
    remote_proxy= 111.111.111.111/255.255.255.255/47/0 (type=1)

1254547: May 17 17:59:08.387 UTC: IPSEC-IFC MGRE/Tu100(
10.20.2.2/111.111.111.111): Socket error (OPEN_FAILED) received.
1254548: May 17 17:59:08.387 UTC: IPSEC-IFC MGRE/Tu100(
10.20.2.2/111.111.111.111): connection lookup returned 47C1E6EC
1254549: May 17 17:59:08.387 UTC: IPSEC-IFC MGRE/Tu100(
10.20.2.2/111.111.111.111): tunnel_protection_socket_down
1254550: May 17 17:59:08.387 UTC: NHRP: Setting cache expiry for
111.111.111.111 to 5000 milliseconds in IPv4 cache
1254551: May 17 17:59:08.387 UTC: NHRP: Setting cache expiry for
111.111.111.111 to 5000 milliseconds in IPv6 cache
1254552: May 17 17:59:08.391 UTC: ISAKMP:(0): retransmitting phase 1
MM_NO_STATE...
1254553: May 17 17:59:08.391 UTC: ISAKMP:(0):peer does not do paranoid
keepalives.

1254554: May 17 17:59:08.391 UTC: ISAKMP:(0):deleting SA reason "Death by
retransmission P1" state (I) MM_NO_STATE (peer 111.111.111.111)
1254555: May 17 17:59:08.391 UTC: ISAKMP:(0):deleting SA reason "Death by
retransmission P1" state (I) MM_NO_STATE (peer 111.111.111.111)
1254556: May 17 17:59:08.391 UTC: ISAKMP: Unlocking peer struct 0x47C2184C
for isadb_mark_sa_deleted(), count 0
1254557: May 17 17:59:08.391 UTC: ISAKMP: Deleting peer node by peer_reap
for 111.111.111.111: 47C2184C
1254558: May 17 17:59:08.391 UTC: ISAKMP:(0):deleting node 665970139 error
FALSE reason "IKE deleted"
1254559: May 17 17:59:08.391 UTC: ISAKMP:(0):deleting node -1373319767 error
FALSE reason "IKE deleted"
1254560: May 17 17:59:08.391 UTC: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PHASE1_DEL
1254561: May 17 17:59:08.391 UTC: ISAKMP:(0):Old State = IKE_I_MM1  New
State = IKE_DEST_SA

1254562: May 17 17:59:08.391 UTC: IPSEC(key_engine): got a queue event with
1 KMI message(s)
1254565: May 17 17:59:10.123 UTC: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= 10.20.2.2, remote= 111.111.111.111,
    local_proxy= 10.20.2.2/255.255.255.255/47/0 (type=1),
    remote_proxy= 111.111.111.111/255.255.255.255/47/0 (type=1),
    protocol= ESP, transform= esp-aes esp-sha-hmac  (Transport),
    lifedur= 3600s and 4608000kb,
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
1254566: May 17 17:59:10.123 UTC: ISAKMP:(0): SA request profile is (NULL)
1254567: May 17 17:59:10.123 UTC: ISAKMP: Created a peer struct for
111.111.111.111, peer port 500
1254568: May 17 17:59:10.123 UTC: ISAKMP: New peer created peer = 0x47BF71A4
peer_handle = 0x8000B287
1254569: May 17 17:59:10.123 UTC: ISAKMP: Locking peer struct 0x47BF71A4,
refcount 1 for isakmp_initiator
1254570: May 17 17:59:10.123 UTC: ISAKMP: local port 500, remote port 500
1254571: May 17 17:59:10.123 UTC: ISAKMP: set new node 0 to QM_IDLE
1254572: May 17 17:59:10.123 UTC: ISAKMP: Find a dup sa in the avl tree
during calling isadb_insert sa = 47BF9474
1254573: May 17 17:59:10.123 UTC: ISAKMP:(0):Can not start Aggressive mode,
trying Main mode.
1254574: May 17 17:59:10.123 UTC: ISAKMP:(0):found peer pre-shared key
matching 111.111.111.111
1254575: May 17 17:59:10.123 UTC: ISAKMP:(0): constructed NAT-T
vendor-rfc3947 ID
1254576: May 17 17:59:10.123 UTC: ISAKMP:(0): constructed NAT-T vendor-07 ID
1254577: May 17 17:59:10.123 UTC: ISAKMP:(0): constructed NAT-T vendor-03 ID
1254578: May 17 17:59:10.123 UTC: ISAKMP:(0): constructed NAT-T vendor-02 ID
1254579: May 17 17:59:10.123 UTC: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC,
IKE_SA_REQ_MM
1254580: May 17 17:59:10.123 UTC: ISAKMP:(0):Old State = IKE_READY  New
State = IKE_I_MM1

1254581: May 17 17:59:10.123 UTC: ISAKMP:(0): beginning Main Mode exchange
1254582: May 17 17:59:10.123 UTC: ISAKMP:(0): sending packet to
111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
1254583: May 17 17:59:10.123 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.

On Tue, May 17, 2011 at 10:31 AM, Andrey <unde...@gmail.com> wrote:

> Mark,
>
> i think "debug dmvpn detail all" would be more useful
>
> --
> Best regards,
> Andrey
>
> On Tue, May 17, 2011 at 11:01 PM, Mark Senteza <msent...@googlemail.com>wrote:
>
>> So here's the "debug crypto isakmp" output of the DMVPN spoke when I
>> change the transform-set to transport mode:
>>
>> 1250096: May 17 16:44:58.279 UTC: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
>> 1250097: May 17 16:44:58.291 UTC: ISAKMP:(0): SA request profile is (NULL)
>> 1250098: May 17 16:44:58.291 UTC: ISAKMP: Created a peer struct for
>> 111.111.111.111, peer port 500
>> 1250099: May 17 16:44:58.291 UTC: ISAKMP: New peer created peer =
>> 0x47C2184C peer_handle = 0x8000B252
>> 1250100: May 17 16:44:58.291 UTC: ISAKMP: Locking peer struct 0x47C2184C,
>> refcount 1 for isakmp_initiator
>> 1250101: May 17 16:44:58.291 UTC: ISAKMP: local port 500, remote port 500
>> 1250102: May 17 16:44:58.291 UTC: ISAKMP: set new node 0 to QM_IDLE
>> 1250103: May 17 16:44:58.291 UTC: ISAKMP: Find a dup sa in the avl tree
>> during calling isadb_insert sa = 49C2CD74
>> 1250104: May 17 16:44:58.291 UTC: ISAKMP:(0):Can not start Aggressive
>> mode, trying Main mode.
>> 1250105: May 17 16:44:58.291 UTC: ISAKMP:(0):found peer pre-shared key
>> matching 111.111.111.111
>> 1250106: May 17 16:44:58.291 UTC: ISAKMP:(0): constructed NAT-T
>> vendor-rfc3947 ID
>> 1250107: May 17 16:44:58.291 UTC: ISAKMP:(0): constructed NAT-T vendor-07
>> ID
>> 1250108: May 17 16:44:58.291 UTC: ISAKMP:(0): constructed NAT-T vendor-03
>> ID
>> 1250109: May 17 16:44:58.291 UTC: ISAKMP:(0): constructed NAT-T vendor-02
>> ID
>> 1250110: May 17 16:44:58.291 UTC: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC,
>> IKE_SA_REQ_MM
>> 1250111: May 17 16:44:58.291 UTC: ISAKMP:(0):Old State = IKE_READY  New
>> State = IKE_I_MM1
>>
>> 1250112: May 17 16:44:58.291 UTC: ISAKMP:(0): beginning Main Mode exchange
>> 1250113: May 17 16:44:58.291 UTC: ISAKMP:(0): sending packet to
>> 204.108.14.201 my_port 500 peer_port 500 (I) MM_NO_STATE
>> 1250114: May 17 16:44:58.291 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.
>> 1250116: May 17 16:45:06.467 UTC: ISAKMP:(0):purging node 81046127
>> 1250117: May 17 16:45:06.467 UTC: ISAKMP:(0):purging node -1754295019
>> 1250118: May 17 16:45:08.295 UTC: ISAKMP:(0): retransmitting phase 1
>> MM_NO_STATE...
>> 1250119: May 17 16:45:08.295 UTC: ISAKMP (0): incrementing error counter
>> on sa, attempt 1 of 5: retransmit phase 1
>> 1250120: May 17 16:45:08.295 UTC: ISAKMP:(0): retransmitting phase 1
>> MM_NO_STATE
>> 1250121: May 17 16:45:08.295 UTC: ISAKMP:(0): sending packet to
>> 111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
>> 1250122: May 17 16:45:08.295 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.
>> 1250123: May 17 16:45:08.411 UTC: ISAKMP:(0):purging node 387403375
>> 1250126: May 17 16:45:16.467 UTC: ISAKMP:(0):purging SA., sa=47BFEEA4,
>> delme=47BFEEA4
>> 1250127: May 17 16:45:18.295 UTC: ISAKMP:(0): retransmitting phase 1
>> MM_NO_STATE...
>> 1250128: May 17 16:45:18.295 UTC: ISAKMP (0): incrementing error counter
>> on sa, attempt 2 of 5: retransmit phase 1
>> 1250129: May 17 16:45:18.295 UTC: ISAKMP:(0): retransmitting phase 1
>> MM_NO_STATE
>> 1250130: May 17 16:45:18.295 UTC: ISAKMP:(0): sending packet to
>> 111.111.111.111 my_port 500 peer_port 500 (I) MM_NO_STATE
>> 1250131: May 17 16:45:18.295 UTC: ISAKMP:(0):Sending an IKE IPv4 Packet.
>> 1250132: May 17 16:45:18.411 UTC: ISAKMP:(0):purging SA., sa=49BC4B84,
>> delme=49BC4B84
>>
>>
>> On Mon, May 16, 2011 at 10:42 PM, Kingsley Charles <
>> kingsley.char...@gmail.com> wrote:
>>
>>> Can you try configuring the transform set of spokes behind NAT using
>>> transport mode.
>>>
>>>
>>> With regards
>>> Kings
>>>
>>> On Tue, May 17, 2011 at 3:16 AM, Mark Senteza 
>>> <msent...@googlemail.com>wrote:
>>>
>>>> Hey all,
>>>>
>>>> A real scenario that I'd appreciate your opinion on.
>>>>
>>>> I've got a DMVPN setup that I'm trying to deploy. The endpoints sit
>>>> inside the secure network, so I'm using NAT's on the ASAs to give them a
>>>> public presence. The VPN wont come up though, and I'm trying to figure out
>>>> what I'm missing and where I should be looking. Appreciate any responses.
>>>>
>>>>
>>>> The DMVPN routers sit behind ASAs on either end. The logical topology
>>>> looks like:
>>>>
>>>> *Router-R1 (DMVPN HUB) Gi0/0.600 -----Router-RA----------ASA-1*
>>>> --------------------INTERNET-------------------*ASA-2---------------Router-RB----------------Gi0/0.603
>>>> Router-R2 (DMVPN Spoke)*
>>>>
>>>> The tunnel source interfaces at both ends have NAT'd IPs on the ASAs and
>>>> use these IPs for peering.
>>>>
>>>> Configs are as follows:
>>>>
>>>> *ROUTER-R1* (DMVPN Hub)
>>>>
>>>> crypto isakmp policy 10
>>>>  encr aes
>>>>  authentication pre-share
>>>>  group 2
>>>>
>>>> crypto isakmp key dmvpnpasswd address 222.222.222.222
>>>>
>>>> crypto ipsec transform-set AESSHA-TRANSFORM esp-aes esp-sha-hmac
>>>>
>>>> crypto ipsec profile DMVPN
>>>>   set transform-set AESSHA-TRANSFORM
>>>>
>>>>
>>>> interface Tunnel100
>>>>  description GI DMVPN Hub Interface
>>>>  ip address 10.1.1.1 255.255.255.248
>>>>  no ip redirects
>>>>  no ip next-hop-self eigrp 100
>>>>  ip nhrp map multicast dynamic
>>>>  ip nhrp network-id 100
>>>>  no ip split-horizon eigrp 100
>>>>  delay 150000
>>>>  tunnel source GigabitEthernet0/0.600
>>>>  tunnel mode gre multipoint
>>>>  tunnel key 100
>>>>  tunnel protection ipsec profile DMVPN
>>>>
>>>> interface GigabitEthernet0/0.600
>>>>   ip address 10.10.1.1 255.255.255.0
>>>>
>>>> router eigrp 100
>>>>  passive-interface default
>>>>  no passive-interface Tunnel100
>>>>  network 10.255.254.48 0.0.0.7
>>>>  no auto-summary
>>>>
>>>>
>>>> *ASA-1*
>>>>
>>>> static (inside,outside) 111.111.111.111 10.10.1.1 netmask
>>>> 255.255.255.255
>>>>
>>>>   access-list OUTSIDE line 66 extended permit esp host 222.222.222.222
>>>> host 111.111.111.111 (hitcnt=0) 0x628ac306
>>>>   access-list OUTSIDE line 66 extended permit gre host 222.222.222.222
>>>> host 111.111.111.111 (hitcnt=0) 0x1e349ff8
>>>>   access-list OUTSIDE line 66 extended permit udp host 222.222.222.222
>>>> host 111.111.111.111 eq isakmp (hitcnt=0) 0x0a22d45b
>>>>   access-list OUTSIDE line 66 extended permit udp host 222.222.222.222
>>>> host 111.111.111.111 eq 4500 (hitcnt=0)
>>>>
>>>> **************************************
>>>>
>>>> *ROUTER-R2*
>>>>
>>>> crypto isakmp policy 10
>>>>  encr aes
>>>>  authentication pre-share
>>>>  group 2
>>>>
>>>> crypto isakmp key dmvpnpasswd address 111.111.111.111
>>>>
>>>> crypto ipsec transform-set AESSHA-TRANSFORM esp-aes esp-sha-hmac
>>>>
>>>> crypto ipsec profile DMVPN
>>>>   set transform-set AESSHA-TRANSFORM
>>>>
>>>> interface Tunnel100
>>>>  description GI DMVPN Spoke Interface
>>>>  ip address 10.1.1.2 255.255.255.248
>>>>  no ip redirects
>>>>  ip nhrp map 10.1.1.1 111.111.111.111
>>>>  ip nhrp map multicast 111.111.111.111
>>>>  ip nhrp network-id 100
>>>>  ip nhrp nhs 10.1.1.1
>>>>  delay 150000
>>>>  tunnel source GigabitEthernet0/0.603
>>>>  tunnel mode gre multipoint
>>>>  tunnel key 100
>>>>  tunnel protection ipsec profile DMVPN
>>>>
>>>> interface GigabitEthernet0/0.603
>>>>   ip address 10.20.2.2 255.255.255.0                               <-
>>>> This has been NAT'd to 222.222.222.222 on the ASA-B firewall, which I dont
>>>> have visibility into.
>>>>
>>>> router eigrp 100
>>>>  passive-interface default
>>>>  no passive-interface Tunnel100
>>>>  network 10.1.1.0 0.0.0.7
>>>>  no auto-summary
>>>>
>>>>
>>>> *Observations:*
>>>>
>>>> 1. I can ping from the DMVPN spoke to the DMVPN hub, using the Public
>>>> IPs and I see the hit-count on the ASA increasing, so I know for sure that
>>>> the routing is fine and the NAT on the remote ASA that I dont manage are
>>>> correct.
>>>> 2. None of the crypto protocol traffic I'm allowing inbound shows any
>>>> hit count.
>>>>
>>>> 3. The following is the "show crypto isakmp sa" output from the DMVPN
>>>> spoke (Router-2)
>>>>
>>>> dst                      src             state
>>>> conn-id status
>>>> 111.111.111.111  10.20.2.2  MM_NO_STATE          0 ACTIVE
>>>> 111.111.111.111  10.20.2.2  MM_NO_STATE          0 ACTIVE (deleted)
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> For more information regarding industry leading CCIE Lab training,
>>>> please visit www.ipexpert.com
>>>>
>>>> Are you a CCNP or CCIE and looking for a job? Check out
>>>> www.PlatinumPlacement.com
>>>>
>>>
>>>
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>> Are you a CCNP or CCIE and looking for a job? Check out
>> www.PlatinumPlacement.com
>>
>
>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to