Looks like the devices aren't configured with same properties.

""Alfredo Pulido""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hello,
>
> I'm trying make a Fully Meshed VPN connections between 3 (Ra,Rb,Rc)
routers
> 827-4V,
>
> The used IOS is: c820-k8osv6y6-mz.122-2.T4.bin -> IP/FW/VOICE PLUS IPSEC
56
>
> When I configure the VPN (Ra-Rb), the VPN it's established OK. But I
> configure VPN (Ra-Rb and Ra-Rc), the system report a error with the peer
Rc,
> and the VPN it's not established between (Ra-Rc),however, the VPN (Ra-Rb)
is
> OK.
>
>     I had trying conjugations (Rb-Ra ,Rb-Rc) and (Rc-Ra,Rc-Rb) and
> (Rb-Rc,Rb-Ra) and (Rc-Rb,Rc-Ra), and I had received the same ERROR.
>
>
>
>
> The system error is:
>
> %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Informational mode failed with
> peer at xxx.xxx.xxx.xxx
>
>     In Cisco I had see only this information:
>
>
> Error Message
>
> %CRYPTO-6-IKMP_MODE_FAILURE: Processing of [chars] mode failed with peer
at
> [IP_address]
> Explanation   Negotiation with the remote peer has failed.
>
> Recommended Action   If this situation persists, contact the remote peer.
>
>
>
> I had locked many documents in Cisco, but I don't know how to solve this
> problem. I shearched a document in Cisco for this type VPN
> http://www.cisco.com/warp/public/707/ios_meshed.html
>
>
> Flash Configuration:
> Ra:   IP VPN: 100.100.100.170  IP LAN: 10.0.1.1
> Rb:   IP VPN: 100.100.100.169  IP LAN: 192.168.0.2
> Rc:   IP VPN: 100.100.100.249  IP LAN: 10.0.0.1
>
>
> Debug Information router (Ra)  when I try connect (Rc-Ra) (debug crypto
> isakmp)
>
> 02:35:37: ISAKMP (0:0): received packet from 100.100.100.249 (N) NEW SA
> 02:35:37: ISAKMP: local port 500, remote port 500
> 02:35:37: ISAKMP (0:2): processing SA payload. message ID = 0
> 02:35:37: ISAKMP (0:2): found peer pre-shared key matching 100.100.100.249
> 02:35:37: ISAKMP (0:2): Checking ISAKMP transform 1 against priority 1
> policy
> 02:35:37: ISAKMP:      encryption DES-CBC
> 02:35:37: ISAKMP:      hash MD5
> 02:35:37: ISAKMP:      default group 1
> 02:35:37: ISAKMP:      auth pre-share
> 02:35:37: ISAKMP (0:2): atts are acceptable. Next payload is 0
> 02:35:37: ISAKMP (0:2): SA is doing pre-shared key authentication using id
> type ID_IPV4_ADDR
> 02:35:37: ISAKMP (0:2): sending packet to 100.100.100.249 (R) MM_SA_SETUP
> 02:35:38: ISAKMP (0:2): received packet from 100.100.100.249 (R)
MM_SA_SETUP
> 02:35:38: ISAKMP (0:2): processing KE payload. message ID = 0
> 02:35:38: ISAKMP (0:2): processing NONCE payload. message ID = 0
> 02:35:38: ISAKMP (0:2): found peer pre-shared key matching 100.100.100.249
> 02:35:38: ISAKMP (0:2): SKEYID state generated
> 02:35:38: ISAKMP (0:2): processing vendor id payload
> 02:35:38: ISAKMP (0:2): speaking to another IOS box!
> 02:35:38: ISAKMP (0:2): sending packet to 100.100.100.249 (R) MM_KEY_EXCH
> 02:35:38: ISAKMP (0:2): received packet from 100.100.100.249 (R)
MM_KEY_EXCH
> 02:35:38: ISAKMP (0:2): processing ID payload. message ID = 0
> 02:35:38: ISAKMP (0:2): processing HASH payload. message ID = 0
> 02:35:38: ISAKMP (0:2): SA has been authenticated with 100.100.100.249
> 02:35:38: ISAKMP (2): ID payload
>         next-payload : 8
>         type         : 1
>         protocol     : 17
>         port         : 500
>         length       : 8
> 02:35:38: ISAKMP (2): Total payload length: 12
> 02:35:38: ISAKMP (0:2): sending packet to 100.100.100.249 (R) QM_IDLE
> 02:35:39: ISAKMP (0:2): received packet from 100.100.100.249 (R) QM_IDLE
> 02:35:39: ISAKMP (0:2): processing HASH payload. message ID = 1758794445
> 02:35:39: ISAKMP (0:2): processing SA payload. message ID = 1758794445
> 02:35:39: ISAKMP (0:2): Checking IPSec proposal 1
> 02:35:39: ISAKMP: transform 1, ESP_DES
> 02:35:39: ISAKMP:   attributes in transform:
> 02:35:39: ISAKMP:      encaps is 1
> 02:35:39: ISAKMP:      SA life type in seconds
> 02:35:39: ISAKMP:      SA life duration (basic) of 3600
> 02:35:39: ISAKMP:      SA life type in kilobytes
> 02:35:39: ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0
> 02:35:39: ISAKMP:      authenticator is HMAC-MD5
> 02:35:39: ISAKMP (0:2): atts are acceptable.
> 02:35:39: ISAKMP (0:2): IPSec policy invalidated proposal
> 02:35:39: ISAKMP (0:2): phase 2 SA not acceptable!
> 02:35:39: ISAKMP (0:2): sending packet to 100.100.100.249 (R) QM_IDLE
> 02:35:39: ISAKMP (0:2): purging node -1391497798
> 02:35:39: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Quick mode failed
with
> peer at 100.100.100.249
> 02:35:39: ISAKMP (0:2): deleting node 1758794445 error FALSE reason
> "IKMP_NO_ERR_NO_TRANS"
>
>
>
> DEBUG INFORMATION IN (Rc)
>
>
> 02:28:20: ISAKMP: received ke message (1/1)
> 02:28:20: ISAKMP: local port 500, remote port 500
> 02:28:20: ISAKMP (0:1): beginning Main Mode exchange
> 02:28:20: ISAKMP (0:1): sending packet to 100.100.100.170 (I) MM_NO_STATE
> 02:28:20: ISAKMP (0:1): received packet from 100.100.100.170 (I)
MM_NO_STATE
> 02:28:20: ISAKMP (0:1): processing SA payload. message ID = 0
> 02:28:20: ISAKMP (0:1): found peer pre-shared key matching 212.64.161.170
> 02:28:20: ISAKMP (0:1): Checking ISAKMP transform 1 against priority 1
> policy
> 02:28:20: ISAKMP:      encryption DES-CBC
> 02:28:20: ISAKMP:      hash MD5
> 02:28:20: ISAKMP:      default group 1
> 02:28:20: ISAKMP:      auth pre-share.
> 02:28:20: ISAKMP (0:1): atts are acceptable. Next payload is 0
> 02:28:20: ISAKMP (0:1): SA is doing pre-shared key authentication using id
> type ID_IPV4_ADDR
> 02:28:20: ISAKMP (0:1): sending packet to 100.100.100.170 (I) MM_SA_SETUP
> 02:28:21: ISAKMP (0:1): received packet from 100.100.100.170 (I)
MM_SA_SETUP
> 02:28:21: ISAKMP (0:1): processing KE payload. message ID = 0
> 02:28:21: ISAKMP (0:1): processing NONCE payload. message ID = 0
> 02:28:21: ISAKMP (0:1): found peer pre-shared key matching 100.100.100.170
> 02:28:21: ISAKMP (0:1): SKEYID state generated
> 02:28:21: ISAKMP (0:1): processing vendor id payload
> 02:28:21: ISAKMP (0:1): speaking to another IOS box!
> 02:28:21: ISAKMP (1): ID payload
>         next-payload : 8
>         type         : 1
>         protocol     : 17
>         port         : 500
>         length       : 8
> 02:28:21: ISAKMP (1): Total payload length: 12
> 02:28:21: ISAKMP (0:1): sending packet to 100.100.100.170 (I) MM_KEY_EXCH
> 02:28:21: ISAKMP (0:1): received packet from 100.100.100.170 (I)
MM_KEY_EXCH
> 02:28:21: ISAKMP (0:1): processing ID payload. message ID = 0
> 02:28:21: ISAKMP (0:1): processing HASH payload. message ID = 0
> 02:28:21: ISAKMP (0:1): SA has been authenticated with 100.100.100.170
> 02:28:21: ISAKMP (0:1): beginning Quick Mode exchange, M-ID of -1116135486
> 02:28:21: ISAKMP (0:1): sending packet to 100.100.100.170 (I) QM_IDLE
> 02:28:21: ISAKMP (0:1): received packet from 100.100.100.170 (I) QM_IDLE
> 02:28:21: ISAKMP (0:1): processing HASH payload. message ID = -792121744
> 02:28:21: ISAKMP (0:1): processing NOTIFY PROPOSAL_NOT_CHOSEN protocol 3
>         spi 2370182913, message ID = -792121744, sa = 814AD8D0
> 02:28:21: ISAKMP (0:1): deleting spi 2370182913 message ID = -1116135486
> 02:28:21: ISAKMP (0:1): deleting node -1116135486 error TRUE reason
> "delete_larval"
> 02:28:21: ISAKMP (0:1): deleting node -792121744 error FALSE reason
> "informational (in) state 1"....
>
>
>
> The IOS configuration are:
>
> --- Router (Ra) ---
>
> version 12.2
> no parser cache
> no service single-slot-reload-enable
> no service pad
> service timestamps debug uptime
> service timestamps log uptime
> service password-encryption
> !
> hostname Ra
> !
> logging rate-limit console 10 except errors
> aaa new-model
> aaa authentication login default local
> enable secret 5 xxxxxxxxxxx
> !
> username root password 7 00000000000
> ip subnet-zero
> !
> ip ssh time-out 120
> ip ssh authentication-retries 3
> no ip dhcp-client network-discovery
> call rsvp-sync
> !
> !
> !
> !
> !
> !
> crypto isakmp policy 1
>  hash md5
>  authentication pre-share
> crypto isakmp key R.47 address 100.100.100.169
> crypto isakmp key R.47 address 100.100.100.249
> !
> !
> crypto ipsec transform-set rtpset esp-des esp-md5-hmac
> !
> crypto map vpn 10 ipsec-isakmp
>  set peer 100.100.100.169
>  set transform-set rtpset
>  match address 102
> crypto map vpn 20 ipsec-isakmp
>  set peer 100.100.100.249
>  set transform-set rtpset
>  match address 101
> !
> !
> !
> !
> interface Ethernet0
>  ip address 10.0.1.1 255.255.255.0
>  ip nat inside
>  no ip route-cache
>  no ip mroute-cache
>  hold-queue 32 in
> !
> interface ATM0
>  no ip address
>  no atm ilmi-keepalive
>  pvc 0/16 ilmi
>  !
>  pvc 1/32
>   encapsulation aal5mux ppp dialer
>   dialer pool-member 1
>  !
>  bundle-enable
>  dsl operating-mode auto
> !
> interface Dialer0
>  ip address negotiated
>  ip nat outside
>  encapsulation ppp
>  no ip route-cache
>  no ip mroute-cache
>  dialer pool 1
>  dialer-group 1
>  ppp pap sent-username usuario password 7 00000000
>  crypto map vpn
> !
> ip classless
> ip nat inside source list 110 interface Dialer0 overload
> ip route 0.0.0.0 0.0.0.0 Dialer0
> no ip http server
> !
> access-list 101 permit ip 10.0.1.0 0.0.0.255 10.0.0.0 0.0.0.255
> access-list 101 deny   ip 10.0.1.0 0.0.0.255 any
> access-list 102 permit ip 10.0.1.0 0.0.0.255 192.168.0.0 0.0.0.255
> access-list 102 deny   ip 10.0.1.0 0.0.0.255 any
> access-list 110 deny   ip 10.0.1.0 0.0.0.255 192.168.0.0 0.0.0.255
> access-list 110 deny   ip 10.0.1.0 0.0.0.255 10.0.0.0 0.0.0.255
> access-list 110 permit ip 10.0.1.0 0.0.0.255 any
> dialer-list 1 protocol ip permit
> !
> !
> voice-port 1
>  cptone DE
> !
> voice-port 2
>  cptone DE
> !
> voice-port 3
>  cptone DE
> !
> voice-port 4
>  cptone DE
> !
> !
> !
> line con 0
>  exec-timeout 120 0
>  stopbits 1
> line vty 0 4
>  exec-timeout 0 0
>  password 7 000000000
> !
> scheduler max-task-time 5000
> end
>
>
>
>
> ---- Router Rb ----
>
> !
> !
> crypto isakmp policy 1
>  hash md5
>  authentication pre-share
> crypto isakmp key R.47 address 100.100.100.169
> crypto isakmp key R.47 address 100.100.100.170
> !
> !
> crypto ipsec transform-set rtpset esp-des esp-md5-hmac
> !
> crypto map vpn 10 ipsec-isakmp
>  set peer 100.100.100.169
>  set transform-set rtpset
>  match address 102
> crypto map vpn 20 ipsec-isakmp
>  set peer 100.100.100.170
>  set transform-set rtpset
>  match address 101
> !
> !
> interface Ethernet0
>  ip address 10.0.0.1 255.255.255.0
>  ip nat inside
>  no ip route-cache
>  no ip mroute-cache
>  hold-queue 32 in
> !
> !
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=44432&t=44374
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to