Here is the full config and debug output from R1 which is the receiving
router. As you can see there is no dns, or ip host configured. All the
phase1/2 related configs were done using IP addresses.
Thanks!
Building configuration...
Current configuration : 1888 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
!
no aaa new-model
memory-size iomem 15
dot11 syslog
ip source-route
!
!
!
!
ip cef
no ipv6 cef
!
multilink bundle-name authenticated
!voice-card 0
!
!
!
!
!
archive
log config
hidekeys
!
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
crypto isakmp identity hostname
!
crypto isakmp peer address 8.9.11.7
set aggressive-mode password cisco
set aggressive-mode client-endpoint user-fqdn R1
!
!
crypto ipsec transform-set ESP3DES esp-3des esp-sha-hmac
!
crypto map VPN 10 ipsec-isakmp
set peer 8.9.11.7
set transform-set ESP3DES
match address l2l
!
interface Loopback0
ip address 10.11.11.11 255.255.255.0
interface FastEthernet0/0
ip address 8.9.11.1 255.255.255.0
duplex auto
speed auto
crypto map VPN
!
interface FastEthernet0/1
ip address 136.1.121.1 255.255.255.0
duplex auto
speed auto
router ospf 1
log-adjacency-changes
network 8.9.11.0 0.0.0.255 area 0
network 10.11.11.0 0.0.0.255 area 0
network 136.1.121.0 0.0.0.255 area 0
!
ip access-list extended l2l
permit ip 10.11.11.0 0.0.0.255 10.7.7.0 0.0.0.255
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
login
!
scheduler allocate 20000 1000
end
R1#debug crypto isakmp
Crypto ISAKMP debugging is on
R1#
*Jun 19 10:38:39.811: ISAKMP (0): received packet from 8.9.11.7 dport 500
sport 500 Global (N) NEW SA
*Jun 19 10:38:39.811: ISAKMP: Created a peer struct for 8.9.11.7, peer port
500
*Jun 19 10:38:39.811: ISAKMP: New peer created peer = 0x67AB2618
peer_handle = 0x80000003
*Jun 19 10:38:39.811: ISAKMP: Locking peer struct 0x67AB2618, refcount 1
for crypto_isakmp_process_block
*Jun 19 10:38:39.811: ISAKMP: local port 500, remote port 500
*Jun 19 10:38:39.811: ISAKMP:(0):insert sa successfully sa = 6829A524
*Jun 19 10:38:39.811: ISAKMP:(0): processing SA payload. message ID = 0
*Jun 19 10:38:39.811: ISAKMP:(0): processing ID payload. message ID = 0
*Jun 19 10:38:39.811: ISAKMP (0): ID payload
next-payload : 13
type : 3
USER FQDN : R7
protocol : 17
port : 0
length : 10
*Jun 19 10:38:39.811: ISAKMP:(0):: peer matches *none* of the profiles
*Jun 19 10:38:39.811: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.811: ISAKMP:(0): vendor ID seems Unity/DPD but major 69
mismatch
*Jun 19 10:38:39.811: ISAKMP (0): vendor ID is NAT-T RFC 3947
*Jun 19 10:38:39.811: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.811: ISAKMP:(0): vendor ID seems Unity/DPD but major 245
mismatch
*Jun 19 10:38:39.811: ISAKMP (0): vendor ID is NAT-T v7
*Jun 19 10:38:39.811: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.811: ISAKMP:(0): vendor ID seems Unity/DPD but major 157
mismatch
*Jun 19 10:38:39.811: ISAKMP:(0): vendor ID is NAT-T v3
*Jun 19 10:38:39.811: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.811: ISAKMP:(0): vendor ID seems Unity/DPD but major 123
mismatch
*Jun 19 10:38:39.811: ISAKMP:(0): vendor ID is NAT-T v2
*Jun 19 10:38:39.811: ISAKMP:(0):SA using tunnel password as pre-shared key.
*Jun 19 10:38:39.815: ISAKMP:(0): local preshared key found
*Jun 19 10:38:39.815: ISAKMP : Scanning profiles for xauth ...
*Jun 19 10:38:39.815: ISAKMP:(0):Checking ISAKMP transform 1 against
priority 10 policy
*Jun 19 10:38:39.815: ISAKMP: encryption 3DES-CBC
*Jun 19 10:38:39.815: ISAKMP: hash SHA
*Jun 19 10:38:39.815: ISAKMP: default group 2
*Jun 19 10:38:39.815: ISAKMP: auth pre-share
*Jun 19 10:38:39.815: ISAKMP: life type in seconds
*Jun 19 10:38:39.815: ISAKMP: life duration (VPI) of 0x0 0x1 0x51
0x80
*Jun 19 10:38:39.815: ISAKMP:(0):atts are acceptable. Next payload is 0
*Jun 19 10:38:39.815: ISAKMP:(0):Acceptable atts:actual life: 0
*Jun 19 10:38:39.815: ISAKMP:(0):Acceptable atts:life: 0
*Jun 19 10:38:39.815: ISAKMP:(0):Fill atts in sa vpi_length:4
*Jun 19 10:38:39.815: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
*Jun 19 10:38:39.815: ISAKMP:(0):Returning Actual lifetime: 86400
*Jun 19 10:38:39.815: ISAKMP:(0)::Started lifetime timer: 86400.
*Jun 19 10:38:39.871: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.871: ISAKMP:(0): vendor ID seems Unity/DPD but major 69
mismatch
*Jun 19 10:38:39.871: ISAKMP (0): vendor ID is NAT-T RFC 3947
*Jun 19 10:38:39.871: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.871: ISAKMP:(0): vendor ID seems Unity/DPD but major 245
mismatch
*Jun 19 10:38:39.871: ISAKMP (0): vendor ID is NAT-T v7
*Jun 19 10:38:39.871: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.871: ISAKMP:(0): vendor ID seems Unity/DPD but major 157
mismatch
*Jun 19 10:38:39.871: ISAKMP:(0): vendor ID is NAT-T v3
*Jun 19 10:38:39.871: ISAKMP:(0): processing vendor id payload
*Jun 19 10:38:39.871: ISAKMP:(0): vendor ID seems Unity/DPD but major 123
mismatch
*Jun 19 10:38:39.871: ISAKMP:(0): vendor ID is NAT-T v2
*Jun 19 10:38:39.871: ISAKMP:(0): processing KE payload. message ID = 0
*Jun 19 10:38:39.943: ISAKMP:(0): processing NONCE payload. message ID = 0
*Jun 19 10:38:39.943: ISAKMP:(0):SA using tunnel password as pre-shared key.
*Jun 19 10:38:39.943: ISAKMP:(1001): processing vendor id payload
*Jun 19 10:38:39.943: ISAKMP:(1001): vendor ID is DPD
*Jun 19 10:38:39.943: ISAKMP:(1001): processing vendor id payload
*Jun 19 10:38:39.943: ISAKMP:(1001): vendor ID seems Unity/DPD but major
242 mismatch
*Jun 19 10:38:39.943: ISAKMP:(1001): vendor ID is XAUTH
*Jun 19 10:38:39.943: ISAKMP:(1001): processing vendor id payload
*Jun 19 10:38:39.943: ISAKMP:(1001): vendor ID is Unity
*Jun 19 10:38:39.943: ISAKMP:(1001): constructed NAT-T vendor-rfc3947 ID
*Jun 19 10:38:39.943: ISAKMP:(1001):SA is doing pre-shared key
authentication using id type ID_FQDN
*Jun 19 10:38:39.943: ISAKMP (1001): ID payload
next-payload : 10
type : 2
FQDN name : R1
protocol : 0
port : 0
length : 10
*Jun 19 10:38:39.943: ISAKMP:(1001):Total payload length: 10
*Jun 19 10:38:39.947: ISAKMP:(1001): sending packet to 8.9.11.7 my_port 500
peer_port 500 (R) AG_INIT_EXCH
*Jun 19 10:38:39.947: ISAKMP:(1001):Sending an IKE IPv4 Packet.
*Jun 19 10:38:39.947: ISAKMP:(1001):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Jun 19 10:38:39.947: ISAKMP:(1001):Old State = IKE_READY New State =
IKE_R_AM2
*Jun 19 10:38:40.019: ISAKMP (1001): received packet from 8.9.11.7 dport
500 sport 500 Global (R) AG_INIT_EXCH
*Jun 19 10:38:40.019: ISAKMP:(1001): processing HASH payload. message ID = 0
*Jun 19 10:38:40.019: ISAKMP:received payload type 20
*Jun 19 10:38:40.019: ISAKMP (1001): His hash no match - this node outside
NAT
*Jun 19 10:38:40.019: ISAKMP:received payload type 20
*Jun 19 10:38:40.019: ISAKMP (1001): No NAT Found for self or peer
*Jun 19 10:38:40.019: ISAKMP:(1001): processing NOTIFY INITIAL_CONTACT
protocol 1
spi 0, message ID = 0, sa = 6829A524
*Jun 19 10:38:40.019: ISAKMP:(1001):SA authentication status:
authenticated
*Jun 19 10:38:40.019: ISAKMP:(1001):SA has been authenticated with 8.9.11.7
*Jun 19 10:38:40.019: ISAKMP:(1001):SA authentication status:
authenticated
*Jun 19 10:38:40.019: ISAKMP:(1001): Process initial contact,
bring down existing phase 1 and 2 SA's with local 8.9.11.1 remote 8.9.11.7
remote port 500
*Jun 19 10:38:40.023: ISAKMP: Trying to insert a peer 8.9.11.1/8.9.11.7/500/,
and inserted successfully 67AB2618.
*Jun 19 10:38:40.023: ISAKMP:(1001):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Jun 19 10:38:40.023: ISAKMP:(1001):Old State = IKE_R_AM2 New State =
IKE_P1_COMPLETE
*Jun 19 10:38:40.023: ISAKMP (1001): received packet from 8.9.11.7 dport
500 sport 500 Global (R) QM_IDLE
*Jun 19 10:38:40.023: ISAKMP: set new node -1201657660 to QM_IDLE
*Jun 19 10:38:40.027: ISAKMP:(1001): processing HASH payload. message ID =
-1201657660
*Jun 19 10:38:40.027: ISAKMP:(1001): processing SA payload. message ID =
-1201657660
*Jun 19 10:38:40.027: ISAKMP:(1001):Checking IPSec proposal 1
*Jun 19 10:38:40.027: ISAKMP: transform 1, ESP_3DES
*Jun 19 10:38:40.027: ISAKMP: attributes in transform:
*Jun 19 10:38:40.027: ISAKMP: encaps is 1 (Tunnel)
*Jun 19 10:38:40.027: ISAKMP: SA life type in seconds
*Jun 19 10:38:40.027: ISAKMP: SA life duration (basic) of 3600
*Jun 19 10:38:40.027: ISAKMP: SA life type in kilobytes
*Jun 19 10:38:40.027: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50
0x0
*Jun 19 10:38:40.027: ISAKMP: authenticator is HMAC-SHA
*Jun 19 10:38:40.027: ISAKMP:(1001):atts are acceptable.
*Jun 19 10:38:40.027: ISAKMP:(1001): processing NONCE payload. message ID =
-1201657660
*Jun 19 10:38:40.027: ISAKMP:(1001): processing ID payload. message ID =
-1201657660
*Jun 19 10:38:40.027: ISAKMP:(1001): processing ID payload. message ID =
-1201657660
*Jun 19 10:38:40.031: ISAKMP:(1001):QM Responder gets spi
*Jun 19 10:38:40.031: ISAKMP:(1001):Node -1201657660, Input =
IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Jun 19 10:38:40.031: ISAKMP:(1001):Old State = IKE_QM_READY New State =
IKE_QM_SPI_STARVE
*Jun 19 10:38:40.031: ISAKMP:(1001): Creating IPSec SAs
*Jun 19 10:38:40.031: inbound SA from 8.9.11.7 to 8.9.11.1 (f/i)
0/ 0
(proxy 10.7.7.0 to 10.11.11.0)
*Jun 19 10:38:40.031: has spi 0xB92582C7 and conn_id 0
*Jun 19 10:38:40.031: lifetime of 3600 seconds
*Jun 19 10:38:40.035: lifetime of 4608000 kilobytes
*Jun 19 10:38:40.035: outbound SA from 8.9.11.1 to 8.9.11.7 (f/i)
0/0
(proxy 10.11.11.0 to 10.7.7.0)
*Jun 19 10:38:40.035: has spi 0xE82D36E1 and conn_id 0
*Jun 19 10:38:40.035: lifetime of 3600 seconds
*Jun 19 10:38:40.035: lifetime of 4608000 kilobytes
*Jun 19 10:38:40.035: ISAKMP:(1001): sending packet to 8.9.11.7 my_port 500
peer_port 500 (R) QM_IDLE
*Jun 19 10:38:40.035: ISAKMP:(1001):Sending an IKE IPv4 Packet.
*Jun 19 10:38:40.035: ISAKMP:(1001):Node -1201657660, Input =
IKE_MESG_INTERNAL, IKE_GOT_SPI
*Jun 19 10:38:40.035: ISAKMP:(1001):Old State = IKE_QM_SPI_STARVE New
State = IKE_QM_R_QM2
*Jun 19 10:38:40.039: ISAKMP:(1001):Input = IKE_MESG_INTERNAL,
IKE_PHASE1_COMPLETE
*Jun 19 10:38:40.039: ISAKMP:(1001):Old State = IKE_P1_COMPLETE New State
= IKE_P1_COMPLETE
*Jun 19 10:38:40.039: ISAKMP (1001): received packet from 8.9.11.7 dport
500 sport 500 Global (R) QM_IDLE
*Jun 19 10:38:40.043: ISAKMP:(1001):deleting node -1201657660 error FALSE
reason "QM done (await)"
*Jun 19 10:38:40.043: ISAKMP:(1001):Node -1201657660, Input =
IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Jun 19 10:38:40.043: ISAKMP:(1001):Old State = IKE_QM_R_QM2 New State =
IKE_QM_PHASE2_COMPLETE
R1#sh crypto session detail
Interface: FastEthernet0/0
Uptime: 00:01:27
Session status: UP-ACTIVE
Peer: 8.9.11.7 port 500 fvrf: (none) ivrf: (none)
Phase1_id: R7
Desc: (none)
IKE SA: local 8.9.11.1/500 remote 8.9.11.7/500 Active
Capabilities:(none) connid:1001 lifetime:23:58:32
IPSEC FLOW: permit ip 10.11.11.0/255.255.255.0 10.7.7.0/255.255.255.0
Active SAs: 2, origin: crypto map
Inbound: #pkts dec'ed 4 drop 0 life (KB/Sec) 4495627/3512
Outbound: #pkts enc'ed 4 drop 0 life (KB/Sec) 4495627/3512
On Mon, Jun 18, 2012 at 9:42 PM, Eugene Pefti <[email protected]>wrote:
> Well, this was not my question, Bruno ;)****
>
> It was Imre who started this thread and I tried to understand what was
> going on.****
>
> Imre, what do you have in your crypto map for the peer? I’m almost
> positive it’s an IP address and as he stated there’s neither DNS server nor
> IP host mapping configured****
>
> ** **
>
> Eugene****
>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com
Are you a CCNP or CCIE and looking for a job? Check out
www.PlatinumPlacement.com