Sorry Piotr, but that`s the config

R1
interface Tunnel100
 ip address 1.1.1.1 255.255.255.0
 tunnel source FastEthernet0/0
 tunnel destination 136.1.122.2
 tunnel mode ipsec ipv4
 tunnel protection ipsec profile ipsec_prof

R2
interface Virtual-Template2 type tunnel
 ip address 1.1.1.2 255.255.255.0
 tunnel source FastEthernet0/0
 tunnel mode ipsec ipv4
 tunnel protection ipsec profile ipsec_prof


Router 2
*show cry isa sa*
dst             src             state          conn-id slot status
136.1.122.2     136.1.121.1     QM_IDLE           1003    0 ACTIVE

*show cry isa sa det*
C-id  Local           Remote          I-VRF    Status Encr Hash Auth DH
Lifetime Cap.

1003  136.1.122.2     136.1.121.1              ACTIVE 3des md5  rsig 2
23:59:40

Router1
*show cry ips sa*
Rack1R1(config)#do cry2

interface: Tunnel100
    Crypto map tag: Tunnel100-head-0, local addr 136.1.121.1

   protected vrf: (none)
   local  ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
   remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
   current_peer 136.1.122.2 port 500
     PERMIT, flags={origin_is_acl,}
    #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0


Running EIGRP on both Routers
router eigrp 1
 network 1.1.1.0 0.0.0.255

Still same issue
Mar  2 08:45:02.331: IPSEC(ipsec_process_proposal): invalid local address
136.1.122.2
Mar  2 08:45:02.335: ISAKMP:(1003): IPSec policy invalidated proposal with
error 8
Mar  2 08:45:02.339: ISAKMP:(1003): phase 2 SA policy not acceptable! (local
136.1.122.2 remote 136.1.121.1)
Mar  2 08:45:02.343: ISAKMP: set new node -1211542580 to QM_IDLE
Mar  2 08:45:02.347: ISAKMP:(1003):Sending NOTIFY PROPOSAL_NOT_CHOSEN
protocol 3
        spi 1690522144, message ID = -1211542580
Mar  2 08:45:02.355: ISAKMP:(1003): sending packet to 136.1.121.1 my_port
500 peer_port 500 (R) QM_IDLE
Rack1R2(config-if)#
Mar  2 08:45:02.355: ISAKMP:(1003):Sending an IKE IPv4 Packet.
Mar  2 08:45:02.359: ISAKMP:(1003):purging node -1211542580
Mar  2 08:45:02.363: ISAKMP:(1003):deleting node 729790222 error TRUE reason
"QM rejected"

As I said, as soon as I configure "tunnel destination 136.1.121.1" pointing
to R1, it works. I did not configure any isakmp profile on R2 to attach
virtual-template because I don't think it would be the solution


Rack1R2(config-if)#*tunnel destination 136.1.121.1*
Mar  2 08:49:11.675: %LINEPROTO-5-UPDOWN: Line protocol on Interface
Virtual-Template2, changed state to up
Mar  2 08:49:12.443: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 1.1.1.1
(Virtual-Template2) is up: new adjacency


On Sat, Mar 5, 2011 at 1:56 PM, Piotr Matusiak <[email protected]> wrote:

> interface Virtual-Template2 type tunnel
> tunnel protection ipsec profile ipsec_prof
>
>
>
> 2011/3/5 Bruno <[email protected]>
>
>> Hey guys,
>>
>> I've been trying to get this stuff working a while and no luck. I am
>> thinking it`s no possible but would like some insights
>>
>> R1 <> ASA <> R2
>>
>> R1
>> interface Tunnel100
>>  ip address 1.1.1.1 255.255.255.0
>>  tunnel source FastEthernet0/0
>>  tunnel destination 136.1.122.2
>>  tunnel mode ipsec ipv4
>>  tunnel protection ipsec profile ipsec_prof
>>
>> R2 initially had the same config and it worked just fine. Then I changed
>> the configuration on R2 to DVTI
>> interface Virtual-Template2 type tunnel
>>  ip address 1.1.1.2 255.255.255.0
>>  tunnel source FastEthernet0/0
>>  tunnel mode ipsec ipv4
>>
>> The interesting is that as soon as I configured *"tunnel destination*"
>> pointing to R1 it works. But that's exactly what I do not want to do,
>> supposing R1 had dynamic ip, it should work without destination address.
>>
>> The log is:
>> IPSec policy invalidated proposal with error 8
>> Mar  2 07:20:35.303: ISAKMP:(1013): phase 2 SA policy not acceptable!
>> (local 136.1.122.2 remote 136.1.121.1)
>> Mar  2 07:20:35.303: ISAKMP: set new node 1645030739 to QM_IDLE
>> Mar  2 07:20:35.311: ISAKMP:(1013):Sending NOTIFY PROPOSAL_NOT_CHOSEN
>> protocol 3
>>
>> Any idea is welcome.
>>
>> Cisco DOC for VTI
>>
>> http://www.cisco.com/en/US/docs/ios/12_3t/12_3t14/feature/guide/gtIPSctm.html
>>
>> --
>> Bruno Fagioli (by Jaunty Jackalope)
>> Cisco Security Professional
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>>
>


-- 
Bruno Fagioli (by Jaunty Jackalope)
Cisco Security Professional
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to