Hi,
I changed static route as suggested by Piotr. Still packets are not
encrypting and decrypting. Below is the output:
R3#ping 1.1.1.1 source lo3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 1.1.1.1, timeout is 2 seconds:
Packet sent with a source address of 3.3.3.3
Oct 10 10:20:27.299: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 20.1.1.1, remote= 10.1.1.1,
local_proxy= 3.3.3.3/255.255.255.255/0/0 (type=1),
remote_proxy= 1.1.1.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes esp-sha-hmac (Tunnel),
lifedur= 3600s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
Oct 10 10:20:27.307: ISAKMP:(0): SA request profile is (NULL)
Oct 10 10:20:27.307: ISAKMP: Created a peer struct for 10.1.1.1, peer port
500
Oct 10 10:20:27.307: ISAKMP: New peer created peer = 0x66161B68 peer_handle
= 0x80000006
Oct 10 10:20:27.307: ISAKMP: Locking peer struct 0x66161B68, refcount 1 for
isakmp_initiator
Oct 10 10:20:27.311: ISAKMP: local port 500, remote port 500
Oct 10 10:20:27.311: ISAKMP: set new node 0 to QM_IDLE
Oct 10 10:20:27.311: insert sa successfully sa = 66BDF730
Oct 10 10:20:27.311: ISAKMP:(0):Can not start Aggressive mode, trying Main
mode.
Oct 10 10:20:27.315: ISAKMP:(.0):No pre-shared key with 10.1.1.1!
Oct 10 10:20:27.315: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Oct 10 10:20:27.319: ISAKMP:(0): constructed NAT-T vendor-07 ID
Oct 10 10:20:27.319: ISAKMP:(0): constructed NAT-T vendor-03 ID
Oct 10 10:20:27.319: ISAKMP:(0): constructed NAT-T vendor-02 ID
Oct 10 10:20:27.319: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
Oct 10 10:20:27.323: ISAKMP:(0):Old State = IKE_READY New State = IKE_I_MM1
Oct 10 10:20:27.323: ISAKMP:(0): beginning Main Mode exchange
Oct 10 10:20:27.323: ISAKMP:(0): sending packet to 10.1.1.1 my_port 500
peer_port 500 (I) MM_NO_STATE
Oct 10 10:20:27.327: ISAKMP:(0):Sending an IKE IPv4 Packet.
Oct 10 10:20:27.695: ISAKMP (0:0): received packet from 10.1.1.1 dport 500
sport 500 Global (I) MM_NO_STATE
Oct 10 10:20:27.699: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Oct 10 10:20:27.699: ISAKMP:(0):Old State = IKE_I_MM1 New State = IKE_I_MM2
Oct 10 10:20:27.707: ISAKMP:(0): processing SA payload. message ID = 0
Oct 10 10:20:27.707: ISAKMP:(0): processing vendor id payload
Oct 10 10:20:27.707: ISAKMP:(0): vendor ID seems Unity/DPD but major 69
mismatch
Oct 10 10:20:27.707: ISAKMP (0:0): vendor ID is NAT-T RFC 3947
Oct 10 10:20:27.711: ISAKMP : Scanning profiles for xauth ...
Oct 10 10:20:27.711: ISAKMP:(0):Checking ISAKMP transform 1 against priority
10 policy
Oct 10 10:20:27.711: ISAKMP: encryption AES-CBC
Oct 10 10:20:27.711: ISAKMP: keylength of 128
Oct 10 10:20:27.711: ISAKMP: hash SHA
Oct 10 10:20:27.715: ISAKMP: default group 2
Oct 10 10:20:27.715: ISAKMP: auth RSA sig
Oct 10 10:20:27.715: ISAKMP: life type in seconds
Oct 10 10:20:27.715: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80
Oct 10 10:20:27.719: ISAKMP:(0):atts are acceptable. Next payload is 0
Oct 10 10:20:27.719: ISAKMP:(0):Acceptable atts:actual life: 0
Oct 10 10:20:27.719: ISAKMP:(0):Acceptable atts:life: 0
Oct 10 10:20:27.719: ISAKMP:(0):Fill atts. in sa vpi_length:4
Oct 10 10:20:27.723: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Oct 10 10:20:27.723: ISAKMP:(0):Returning Actual lifetime: 86400
Oct 10 10:20:27.723: ISAKMP:(0)::Started lifetime timer: 86400.
Oct 10 10:20:27.723: ISAKMP:(0): processing vendor id payload
Oct 10 10:20:27.723: ISAKMP:(0): vendor ID seems Unity/DPD but major 69
mismatch
Oct 10 10:20:27.727: ISAKMP (0:0): vendor ID is NAT-T RFC 3947
Oct 10 10:20:27.727: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
Oct 10 10:20:27.727: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM2
Oct 10 10:20:27.739: ISAKMP (0:0): constructing CERT_REQ for issuer cn=R2 CA
Server,l=London,st=MI
Oct 10 10:20:27.743: ISAKMP:(0): sending packet to 10.1.1.1 my_port 500
peer_port 500 (I) MM_SA_SETUP
Oct 10 10:20:27.743: ISAKMP:(0):Sending an IKE IPv4 Packet.
Oct 10 10:20:27.747: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
Oct 10 10:20:27.747: ISAKMP:(0):Old State = IKE_I_MM2 New State = IKE_I_MM3
Oct 10 10:20:28.239: ISAKMP (0:0): received packet from 10.1.1.1 dport 500
sport 500 Global (I) MM_SA_SETUP
Oct 10 10:20:28.243: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Oct 10 10:20:28.243: ISAKMP:(0):Old State = IKE_I_MM3 New State = IKE_I_MM4
Oct 10 10:20:28.247: ISAKMP:(0): processing KE payload. message ID = 0
Oct 10 10:20:28.335: ISAKMP:(0): processing NONCE payload. message ID = 0
Oct 10 10:20:28.339: ISAKMP:(1005): processing CERT_REQ payload. message ID
= 0
Oct 10 10:20:28.339: ISAKMP:(1005): peer wants a CT_X509_SIGNATURE cert
Oct 10 10:20:28.343: ISAKMP:(1005): peer wants cert issued by cn=R2 CA
Server,l=London,st=MI
Oct 10 10:20:28.343: ISAKMP:(1005): issuer name is not a trusted root.
Oct 10 10:20:28.347: ISAKMP:(1005): processing vendor id payload
Oct 10 10:20:28.347: ISAKMP:(1005): vendor ID is Unity
Oct 10 10:20:28.347: ISAKMP:(1005): processing vendor id payload
Oct 10 10:20:28.347: ISAKMP:(1005): vendor ID is DPD
Oct. 10 10:20:28.351: ISAKMP:(1005): processing vendor id payload
Oct 10 10:20:28.351: ISAKMP:(1005): speaking to another IOS box!
Oct 10 10:20:28.351: ISAKMP:received payload type 20
Oct 10 10:20:28.351: ISAKMP:received payload type 20
Oct 10 10:20:28.355: ISAKMP:(1005):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
Oct 10 10:20:28.355: ISAKMP:(1005):Old State = IKE_I_MM4 New State =
IKE_I_MM4
Oct 10 10:20:28.415: ISAKMP:(1005):Send initial contact
Oct 10 10:20:28.415: ISAKMP:(1005):Unable to get router cert or routerdoes
not have a cert: needed to find DN!
Oct 10 10:20:28.415: ISAKMP(0:1005): Unable to get our DN from cert, using
my FQDN as identity
Oct 10 10:20:28.419: ISAKMP:(1005):SA is doing RSA signature authentication
using id type ID_FQDN
Oct 10 10:20:28.419: ISAKMP (0:1005): ID payload
next-payload : 6
type : 2
FQDN name : R3
protocol : 17
port : 500
length : 10
Oct 10 10:20:28.423: ISAKMP:(1005):Total payload length: 10
Oct 10 10:20:28.423: ISAKMP:(1005): no valid cert found to return
Oct 10 10:20:28.423: ISAKMP: set new node 645628590 to QM_IDLE
Oct 10 10:20:28.427: ISAKMP:(1005):Sending NOTIFY CERTIFICATE_UNAVAILABLE
protocol 1
spi 0, message ID = 645628590
Oct 10 10:20:28.431: ISAKMP:(1005): sending packet to 10.1.1.1 my_port 500
peer_port 500 (I) MM_KEY_EXCH
Oct 10 10:20:28.431: ISAKMP:(1005):Sending an IKE IPv4 Packet.
Oct 10 10:20:28.431: ISAKMP:(1005):purging node 645628590
Oct 10 10:20:28.435: ISAKMP (0:1005): FSM action returned error: 2
Oct 10 10:20:28.435: ISAKMP:(1005):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
Oct 10 10:20:28.435: ISAKMP:(1005):Old State = IKE_I_MM4 New State =
IKE_I_MM5
..
Success rate is 0 percent (0/5)
R3#
Oct 10 10:20:37.744: ISAKMP:(1005): no outgoing phase 1 packet to
retransmit. MM_KEY_EXCH
Oct 10 10:20:38.136: ISAKMP (0:1005): received packet from 10.1.1.1 dport
500 sport 500 Global (I) MM_KEY_EXCH
Oct 10 10:20:38.136: ISAKMP:(1005): phase 1 packet is a duplicate of a
previous packet.
Oct 10 10:20:38.136: ISAKMP:(1005): retransmitting due to retransmit phase 1
Oct 10 10:20:38.140: ISAKMP:(1005): no outgoing phase 1 packet to
retransmit. MM_KEY_EXCH
Oct 10 10:20:48.148: ISAKMP (0:1005): received packet from 10.1.1.1 dport
500 sport 500 Global (I) MM_KEY_EXCH
Oct 10 10:20:48.148: ISAKMP:(1005): phase 1 packet is a duplicate of a
previous packet.
Oct 10 10:20:48.148: ISAKMP:(1005): retransmitting due to retransmit phase 1
Oct 10 10:20:48.152: ISAKMP:(1005): no outgoing phase 1 packet to
retransmit. MM_KEY_EXCH
Oct 10 10:20:57.300: IPSEC(key_engine): request timer fired: count = 1,
(identity) local= 20.1.1.1, remote= 10.1.1.1,
local_proxy= 3.3.3.3/255.255.255.255/0/0 (type=1),
remote_proxy= 1.1.1.1/255.255.255.255/0/0 (type=1)
Oct 10 10:20:57.304: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 20.1.1.1, remote= 10.1.1.1,
local_proxy= 3.3.3.3/255.255.255.255/0/0 (type=1),
remote_proxy= 1.1.1.1/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes esp-sha-hmac (Tunnel),
lifedur= 3600s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
Oct 10 10:20:57.308: ISAKMP: set new node 0 to QM_IDLE
Oct 10 10:20:57.312: ISAKMP:(1005):SA is still budding. Attached new ipsec
request to it. (local 20.1.1.1, remote 10.1.1.1)
Oct 10 10:20:57.312: ISAKMP: Error while processing SA request: Failed to
initialize SA
Oct 10 10:20:57.312: ISAKMP: Error while processing KMI message 0, error 2.
Oct 10 10:20:58.152: ISAKMP (0:1005): received packet from 10.1.1.1 dport
500 sport 500 Global (I) MM_KEY_EXCH
Oct 10 10:20:58.156: ISAKMP:(1005): phase 1 packet is a duplicate of a
previous packet.
Oct 10 10:20:58.156: ISAKMP:(1005): retransmitting due to retransmit phase 1
Oct 10 10:20:58.156: ISAKMP:(1005): no outgoing phase 1 packet to
retransmit. MM_KEY_EXCH
Oct 10 10:21:08.153: ISAKMP (0:1005): received packet from 10.1.1.1 dport
500 sport 500 Global (I) MM_KEY_EXCH
Oct 10 10:21:08.157: ISAKMP:(1005): phase 1 packet is a duplicate of a
previous packet.
Oct 10 10:21:08.157: ISAKMP:(1005): retransmitting due to retransmit phase 1
Oct 10 10:21:08.157: ISAKMP:(1005): no outgoing phase 1 packet to
retransmit. MM_KEY_EXCH
Oct 10 10:21:18.138: ISAKMP (0:1005): received packet from 10.1.1.1 dport
500 sport 500 Global (I) MM_KEY_EXCH
Oct 10 10:21:18.138: ISAKMP:(1005): phase 1 packet is a duplicate of a
previous packet.
Oct 10 10:21:18.138: ISAKMP:(1005): retransmitting due to retransmit phase 1
Oct 10 10:21:18.142: ISAKMP:(1005): no outgoing phase 1 packet to
retransmit. MM_KEY_EXCH
Oct 10 10:21:27.302: IPSEC(key_engine): request timer fired: count = 2,
(identity) local= 20.1.1.1, remote= 10.1.1.1,
local_proxy= 3.3.3.3/255.255.255.255/0/0 (type=1),
remote_proxy= 1.1.1.1/255.255.255.255/0/0 (type=1)
Oct 10 10:21:42.315: ISAKMP: quick mode timer expired.
Oct 10 10:21:42.315: ISAKMP:(1005):src 20.1.1.1 dst 10.1.1.1, SA is not
authenticated
Oct 10 10:21:42.315: ISAKMP:(1005):peer does not do paranoid keepalives.
Oct 10 10:21:42.319: ISAKMP:(1005):deleting SA reason "QM_TIMER expired"
state (I) MM_KEY_EXCH (peer 10.1.1.1)
Oct 10 10:21:42.323: ISAKMP:(1005):deleting SA reason "QM_TIMER expired"
state (I) MM_KEY_EXCH (peer 10.1.1.1)
Oct 10 10:21:42.323: ISAKMP: Unlocking peer struct 0x66161B68 for
isadb_mark_sa_deleted(), count 0
Oct 10 10:21:42.327: ISAKMP: Deleting peer node by peer_reap for 10.1.1.1:
66161B68
Oct 10 10:21:42.327: ISAKMP:(1005):deleting node -723389659 error FALSE
reason "IKE deleted"
Oct 10 10:21:42.327: ISAKMP:(1005):deleting node 467977890 error FALSE
reason "IKE deleted"
Oct 10 10:21:42.331: ISAKMP:(1005):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Oct 10 10:21:42.331: ISAKMP:(1005):Old State = IKE_I_MM5 New State =
IKE_DEST_SA
Oct 10 10:21:42.335: IPSEC(key_engine): got a queue event with 1 KMI
message(s)^Z
R3#un all
On Mon, Oct 10, 2011 at 1:12 AM, Piotr Matusiak <[email protected]> wrote:
> Hi,
>
> You have wrong static routes configured on R1 and R3. IP address 1.1.1.1 is
> local on R1, there should be static configured for 3.3.3.3. same on R3.
>
> Regards,
> Piotr
>
>
>
> 2011/10/9 parvez ahmad <[email protected]>
>
>> Hi All,
>>
>>
>>
>> Network Diagram,
>>
>> *
>> lo1-----R1(10.1.1.1)--------(10.1.1.2)R2(20.1.1.2)-----------(20.1.1.1)R3---lo3
>> *
>> * loop2 for NTP Server*
>>
>>
>> I am creating site to site tunnel between R1 and R3 by using CA.but it is
>> not working.
>>
>> where loop1 and loop3 are the intresting traffic with respected routers.
>> R1 and R3 are authenticated and enrolled with CA server lo2.
>>
>>
>>
>>
>>
>> -----------------------------------------------------------------------------------
>> R1 config
>>
>> ---------------------------------------------------------------------------------------
>>
>>
>> crypto pki trustpoint R3
>> enrollment url http://2.2.2.2:80
>> subject-name CN = R3.cisco.com
>> revocation-check crl
>> rsakeypair R3.cisco.com
>>
>> crypto pki certificate chain R3
>> certificate ca 01
>> 30820241 308201AA A0030201 02020101 300D0609 2A864886 F70D0101 04050030
>>
>> quit
>>
>>
>> crypto isakmp policy 10
>> encr aes
>> group 2
>> crypto isakmp identity dn
>> !
>> !
>> crypto ipsec transform-set TSET esp-aes esp-sha-hmac
>> !
>> crypto map MAP 10 ipsec-isakmp
>> set peer 20.1.1.1
>> set transform-set TSET
>> match address ACS
>> !
>> !
>> !
>> ip ssh version 1
>> !
>> !
>> !
>> !
>> interface Loopback1
>> ip address 1.1.1.1 255.255.255.0
>> !
>> interface FastEthernet0/0
>> ip address 10.1.1.1 255.255.255.0
>> duplex auto
>> speed auto
>> crypto map MAP
>>
>> router eigrp 1
>> network 10.0.0.0
>> no auto-summary
>> !
>> ip forward-protocol nd
>> ip route 1.1.1.0 255.255.255.0 10.1.1.2
>> !
>> !
>> ip http server
>> no ip http secure-server
>> !
>> ip access-list extended ACS
>> permit ip host 1.1.1.1 host 3.3.3.3
>>
>>
>> ntp authentication-key 1 md5 13061E010803 7
>> ntp authenticate
>> ntp trusted-key 1
>> ntp clock-period 17179880
>> ntp server 2.2.2.2
>> -----------------------------------------------------------------------
>> R2 Config
>> -----------------------------------------------------------------------
>>
>> crypto pki server R2
>> database level complete
>> database archive pem password 7 060506324F41584B56
>> issuer-name CN = R2 CA Server,L = London,ST = MI
>> cdp-url http://2.2.2.2/cgi-bin/pkiclient.exe?operation=GetCRL
>> database url flash:
>> !
>> crypto pki trustpoint R2
>> revocation-check crl
>> rsakeypair R2.cisco.com
>>
>> !
>> crypto pki certificate chain R2
>> certificate ca 01
>> 30820241 308201AA A0030201 02020101 300D0609 2A864886 F70D0101 04050030
>>
>> quit
>>
>>
>> interface FastEthernet0/0
>> ip address 10.1.1.2 255.255.255.0
>> duplex auto
>> speed auto
>> !
>> interface FastEthernet0/1
>> ip address 20.1.1.2 255.255.255.0
>> duplex auto
>> speed auto
>> !
>> router eigrp 1
>> network 2.0.0.0
>> network 10.0.0.0
>> network 20.0.0.0
>> no auto-summary
>> !
>> ip forward-protocol nd
>> !
>> !
>> ip http server
>> no ip http secure-server
>>
>>
>> ntp authentication-key 1 md5 14141B180F0B 7
>> ntp authenticate
>> ntp trusted-key 1
>> ntp source Loopback0
>> ntp master 2
>>
>> --------------------------------------------------------------------
>> R3 Config
>> --------------------------------------------------------------------
>>
>> crypto pki trustpoint R3
>> enrollment url http://2.2.2.2:80
>> subject-name CN = R3.cisco.com
>> revocation-check crl
>> rsakeypair R3.cisco.com
>>
>> crypto pki certificate chain R3
>> certificate ca 01
>> 30820241 308201AA A0030201 02020101 300D0609 2A864886 F70D0101 04050030
>>
>> 4B201CC6 E7
>> quit
>>
>>
>> crypto isakmp policy 10
>> encr aes
>> group 2
>> crypto isakmp identity dn
>> !
>> !
>> crypto ipsec transform-set TSET esp-aes esp-sha-hmac
>> !
>> crypto map MAP 10 ipsec-isakmp
>> set peer 10.1.1.1
>> set transform-set TSET
>> match address ACS
>>
>> interface Loopback3
>> ip address 3.3.3.3 255.255.255.0
>> !
>> interface FastEthernet0/0
>> no ip address
>> shutdown
>> duplex auto
>> speed auto
>> !
>> interface FastEthernet0/1
>> ip address 20.1.1.1 255.255.255.0
>> duplex auto
>> speed auto
>> crypto map MAP
>> !
>> router eigrp 1
>> network 20.0.0.0
>> no auto-summary
>> !
>> ip forward-protocol nd
>> ip route 3.3.3.0 255.255.255.0 20.1.1.2
>> !
>> !
>> ip http server
>> no ip http secure-server
>> !
>> ip access-list extended ACS
>> permit ip host 3.3.3.3 host 1.1.1.1
>>
>> ntp authentication-key 1 md5 00071A150754 7
>> ntp authenticate
>> ntp trusted-key 1
>> ntp clock-period 17179821
>> ntp server 2.2.2.2
>> !
>>
>>
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>> Are you a CCNP or CCIE and looking for a job? Check out
>> www.PlatinumPlacement.com
>>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com
Are you a CCNP or CCIE and looking for a job? Check out
www.PlatinumPlacement.com