Hello,
I'm trying make a Fully Meshed VPN connections between 3 (Ra,Rb,Rc) routers
827-4V,
The used IOS is: c820-k8osv6y6-mz.122-2.T4.bin -> IP/FW/VOICE PLUS IPSEC 56
When I configure the VPN (Ra-Rb), the VPN it's established OK. But I
configure VPN (Ra-Rb and Ra-Rc), the system report a error with the peer Rc,
and the VPN it's not established between (Ra-Rc),however, the VPN (Ra-Rb) is
OK.
I had trying conjugations (Rb-Ra ,Rb-Rc) and (Rc-Ra,Rc-Rb) and
(Rb-Rc,Rb-Ra) and (Rc-Rb,Rc-Ra), and I had received the same ERROR.
The system error is:
%CRYPTO-6-IKMP_MODE_FAILURE: Processing of Informational mode failed with
peer at xxx.xxx.xxx.xxx
In Cisco I had see only this information:
Error Message
%CRYPTO-6-IKMP_MODE_FAILURE: Processing of [chars] mode failed with peer at
[IP_address]
Explanation Negotiation with the remote peer has failed.
Recommended Action If this situation persists, contact the remote peer.
I had locked many documents in Cisco, but I don't know how to solve this
problem. I shearched a document in Cisco for this type VPN
http://www.cisco.com/warp/public/707/ios_meshed.html
Flash Configuration:
Ra: IP VPN: 100.100.100.170 IP LAN: 10.0.1.1
Rb: IP VPN: 100.100.100.169 IP LAN: 192.168.0.2
Rc: IP VPN: 100.100.100.249 IP LAN: 10.0.0.1
Debug Information router (Ra) when I try connect (Rc-Ra) (debug crypto
isakmp)
02:35:37: ISAKMP (0:0): received packet from 100.100.100.249 (N) NEW SA
02:35:37: ISAKMP: local port 500, remote port 500
02:35:37: ISAKMP (0:2): processing SA payload. message ID = 0
02:35:37: ISAKMP (0:2): found peer pre-shared key matching 100.100.100.249
02:35:37: ISAKMP (0:2): Checking ISAKMP transform 1 against priority 1
policy
02:35:37: ISAKMP: encryption DES-CBC
02:35:37: ISAKMP: hash MD5
02:35:37: ISAKMP: default group 1
02:35:37: ISAKMP: auth pre-share
02:35:37: ISAKMP (0:2): atts are acceptable. Next payload is 0
02:35:37: ISAKMP (0:2): SA is doing pre-shared key authentication using id
type ID_IPV4_ADDR
02:35:37: ISAKMP (0:2): sending packet to 100.100.100.249 (R) MM_SA_SETUP
02:35:38: ISAKMP (0:2): received packet from 100.100.100.249 (R) MM_SA_SETUP
02:35:38: ISAKMP (0:2): processing KE payload. message ID = 0
02:35:38: ISAKMP (0:2): processing NONCE payload. message ID = 0
02:35:38: ISAKMP (0:2): found peer pre-shared key matching 100.100.100.249
02:35:38: ISAKMP (0:2): SKEYID state generated
02:35:38: ISAKMP (0:2): processing vendor id payload
02:35:38: ISAKMP (0:2): speaking to another IOS box!
02:35:38: ISAKMP (0:2): sending packet to 100.100.100.249 (R) MM_KEY_EXCH
02:35:38: ISAKMP (0:2): received packet from 100.100.100.249 (R) MM_KEY_EXCH
02:35:38: ISAKMP (0:2): processing ID payload. message ID = 0
02:35:38: ISAKMP (0:2): processing HASH payload. message ID = 0
02:35:38: ISAKMP (0:2): SA has been authenticated with 100.100.100.249
02:35:38: ISAKMP (2): ID payload
next-payload : 8
type : 1
protocol : 17
port : 500
length : 8
02:35:38: ISAKMP (2): Total payload length: 12
02:35:38: ISAKMP (0:2): sending packet to 100.100.100.249 (R) QM_IDLE
02:35:39: ISAKMP (0:2): received packet from 100.100.100.249 (R) QM_IDLE
02:35:39: ISAKMP (0:2): processing HASH payload. message ID = 1758794445
02:35:39: ISAKMP (0:2): processing SA payload. message ID = 1758794445
02:35:39: ISAKMP (0:2): Checking IPSec proposal 1
02:35:39: ISAKMP: transform 1, ESP_DES
02:35:39: ISAKMP: attributes in transform:
02:35:39: ISAKMP: encaps is 1
02:35:39: ISAKMP: SA life type in seconds
02:35:39: ISAKMP: SA life duration (basic) of 3600
02:35:39: ISAKMP: SA life type in kilobytes
02:35:39: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
02:35:39: ISAKMP: authenticator is HMAC-MD5
02:35:39: ISAKMP (0:2): atts are acceptable.
02:35:39: ISAKMP (0:2): IPSec policy invalidated proposal
02:35:39: ISAKMP (0:2): phase 2 SA not acceptable!
02:35:39: ISAKMP (0:2): sending packet to 100.100.100.249 (R) QM_IDLE
02:35:39: ISAKMP (0:2): purging node -1391497798
02:35:39: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Quick mode failed with
peer at 100.100.100.249
02:35:39: ISAKMP (0:2): deleting node 1758794445 error FALSE reason
"IKMP_NO_ERR_NO_TRANS"
DEBUG INFORMATION IN (Rc)
02:28:20: ISAKMP: received ke message (1/1)
02:28:20: ISAKMP: local port 500, remote port 500
02:28:20: ISAKMP (0:1): beginning Main Mode exchange
02:28:20: ISAKMP (0:1): sending packet to 100.100.100.170 (I) MM_NO_STATE
02:28:20: ISAKMP (0:1): received packet from 100.100.100.170 (I) MM_NO_STATE
02:28:20: ISAKMP (0:1): processing SA payload. message ID = 0
02:28:20: ISAKMP (0:1): found peer pre-shared key matching 212.64.161.170
02:28:20: ISAKMP (0:1): Checking ISAKMP transform 1 against priority 1
policy
02:28:20: ISAKMP: encryption DES-CBC
02:28:20: ISAKMP: hash MD5
02:28:20: ISAKMP: default group 1
02:28:20: ISAKMP: auth pre-share.
02:28:20: ISAKMP (0:1): atts are acceptable. Next payload is 0
02:28:20: ISAKMP (0:1): SA is doing pre-shared key authentication using id
type ID_IPV4_ADDR
02:28:20: ISAKMP (0:1): sending packet to 100.100.100.170 (I) MM_SA_SETUP
02:28:21: ISAKMP (0:1): received packet from 100.100.100.170 (I) MM_SA_SETUP
02:28:21: ISAKMP (0:1): processing KE payload. message ID = 0
02:28:21: ISAKMP (0:1): processing NONCE payload. message ID = 0
02:28:21: ISAKMP (0:1): found peer pre-shared key matching 100.100.100.170
02:28:21: ISAKMP (0:1): SKEYID state generated
02:28:21: ISAKMP (0:1): processing vendor id payload
02:28:21: ISAKMP (0:1): speaking to another IOS box!
02:28:21: ISAKMP (1): ID payload
next-payload : 8
type : 1
protocol : 17
port : 500
length : 8
02:28:21: ISAKMP (1): Total payload length: 12
02:28:21: ISAKMP (0:1): sending packet to 100.100.100.170 (I) MM_KEY_EXCH
02:28:21: ISAKMP (0:1): received packet from 100.100.100.170 (I) MM_KEY_EXCH
02:28:21: ISAKMP (0:1): processing ID payload. message ID = 0
02:28:21: ISAKMP (0:1): processing HASH payload. message ID = 0
02:28:21: ISAKMP (0:1): SA has been authenticated with 100.100.100.170
02:28:21: ISAKMP (0:1): beginning Quick Mode exchange, M-ID of -1116135486
02:28:21: ISAKMP (0:1): sending packet to 100.100.100.170 (I) QM_IDLE
02:28:21: ISAKMP (0:1): received packet from 100.100.100.170 (I) QM_IDLE
02:28:21: ISAKMP (0:1): processing HASH payload. message ID = -792121744
02:28:21: ISAKMP (0:1): processing NOTIFY PROPOSAL_NOT_CHOSEN protocol 3
spi 2370182913, message ID = -792121744, sa = 814AD8D0
02:28:21: ISAKMP (0:1): deleting spi 2370182913 message ID = -1116135486
02:28:21: ISAKMP (0:1): deleting node -1116135486 error TRUE reason
"delete_larval"
02:28:21: ISAKMP (0:1): deleting node -792121744 error FALSE reason
"informational (in) state 1"....
The IOS configuration are:
--- Router (Ra) ---
version 12.2
no parser cache
no service single-slot-reload-enable
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname Ra
!
logging rate-limit console 10 except errors
aaa new-model
aaa authentication login default local
enable secret 5 xxxxxxxxxxx
!
username root password 7 00000000000
ip subnet-zero
!
ip ssh time-out 120
ip ssh authentication-retries 3
no ip dhcp-client network-discovery
call rsvp-sync
!
!
!
!
!
!
crypto isakmp policy 1
hash md5
authentication pre-share
crypto isakmp key R.47 address 100.100.100.169
crypto isakmp key R.47 address 100.100.100.249
!
!
crypto ipsec transform-set rtpset esp-des esp-md5-hmac
!
crypto map vpn 10 ipsec-isakmp
set peer 100.100.100.169
set transform-set rtpset
match address 102
crypto map vpn 20 ipsec-isakmp
set peer 100.100.100.249
set transform-set rtpset
match address 101
!
!
!
!
interface Ethernet0
ip address 10.0.1.1 255.255.255.0
ip nat inside
no ip route-cache
no ip mroute-cache
hold-queue 32 in
!
interface ATM0
no ip address
no atm ilmi-keepalive
pvc 0/16 ilmi
!
pvc 1/32
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
bundle-enable
dsl operating-mode auto
!
interface Dialer0
ip address negotiated
ip nat outside
encapsulation ppp
no ip route-cache
no ip mroute-cache
dialer pool 1
dialer-group 1
ppp pap sent-username usuario password 7 00000000
crypto map vpn
!
ip classless
ip nat inside source list 110 interface Dialer0 overload
ip route 0.0.0.0 0.0.0.0 Dialer0
no ip http server
!
access-list 101 permit ip 10.0.1.0 0.0.0.255 10.0.0.0 0.0.0.255
access-list 101 deny ip 10.0.1.0 0.0.0.255 any
access-list 102 permit ip 10.0.1.0 0.0.0.255 192.168.0.0 0.0.0.255
access-list 102 deny ip 10.0.1.0 0.0.0.255 any
access-list 110 deny ip 10.0.1.0 0.0.0.255 192.168.0.0 0.0.0.255
access-list 110 deny ip 10.0.1.0 0.0.0.255 10.0.0.0 0.0.0.255
access-list 110 permit ip 10.0.1.0 0.0.0.255 any
dialer-list 1 protocol ip permit
!
!
voice-port 1
cptone DE
!
voice-port 2
cptone DE
!
voice-port 3
cptone DE
!
voice-port 4
cptone DE
!
!
!
line con 0
exec-timeout 120 0
stopbits 1
line vty 0 4
exec-timeout 0 0
password 7 000000000
!
scheduler max-task-time 5000
end
---- Router Rb ----
!
!
crypto isakmp policy 1
hash md5
authentication pre-share
crypto isakmp key R.47 address 100.100.100.169
crypto isakmp key R.47 address 100.100.100.170
!
!
crypto ipsec transform-set rtpset esp-des esp-md5-hmac
!
crypto map vpn 10 ipsec-isakmp
set peer 100.100.100.169
set transform-set rtpset
match address 102
crypto map vpn 20 ipsec-isakmp
set peer 100.100.100.170
set transform-set rtpset
match address 101
!
!
interface Ethernet0
ip address 10.0.0.1 255.255.255.0
ip nat inside
no ip route-cache
no ip mroute-cache
hold-queue 32 in
!
!
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]