Hi All,

I was under the impression that the application of the ISAKMP profile
allows the trustpoint to be chosen and used to authenticate a peer based on
the match commands configured in the profile. For this reason I had the
understanding it was more about which trustpoint to compare a certificate
received from an IPSec pair against, not for deciding which trustpoints ID
certificate is to be sent to the peer when initiating an tunnel. Anyway, I
have added the ISAKMP profile to the and still have the same issues.

I first configured the following on R5 (which by the way is not the CA, the
CA is another router - R1)


R5(config)#crypto map cryptomap1 10 ipsec-isakmp
R5(config-crypto-map)#set isakmp-profile isakmpprof1


The resulant configuration was as follows


R5#show running-config
Building configuration...

Current configuration : 7300 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R5
!
boot-start-marker
boot-end-marker
!
enable password cisco
!
no aaa new-model
memory-size iomem 5
ip cef
!
no ip domain lookup
ip domain name cisco.com
!
frame-relay switching
multilink bundle-name authenticated
!
parameter-map type inspect SMTP
 sessions maximum 2147483647
parameter-map type regex EMAIL
 pattern [email protected]
!
crypto pki trustpoint myCA
 enrollment url http://10.1.1.1:80
 fqdn R5.cisco.com
 ip-address 10.5.5.5
 subject-name cn=R5
 revocation-check none
 rsakeypair myCA-KEYS
!
crypto pki certificate map certmap1 10
 issuer-name co myca
 subject-name co asa2
!
crypto pki certificate chain myCA
 certificate 06
  19311730 15060355 0403130E 6D794341 2E636973 636F2E63 6F6D301E 170D3132
        quit
 certificate ca 01
  3082020B 30820174 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
        quit
!
archive
 log config
  hidekeys
!
crypto isakmp policy 11
 encr aes
 group 5
crypto isakmp identity dn
crypto isakmp profile isakmpprof1
   self-identity fqdn
   ca trust-point myCA
   match certificate certmap1
!
crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac
!
crypto map cryptomap1 local-address Loopback6
crypto map cryptomap1 10 ipsec-isakmp
 set peer 192.168.9.10
 set transform-set aes-sha
 set isakmp-profile isakmpprof1
 match address crypto1
!
ip tcp synwait-time 5
!
class-map type inspect match-all MAIL
 match protocol smtp
class-map type inspect match-all ICMP
 match protocol icmp
class-map type inspect match-all IP
 match access-group 100
class-map type inspect smtp match-any Large_Mail
 match  data-length gt 10000000
class-map type inspect match-all ALL
class-map type inspect match-all WEB
 match protocol http
class-map type inspect match-any other
 match protocol telnet
 match protocol ssh
class-map type inspect http match-all HTTP_Misuse
 match  request port-misuse any
!
policy-map type inspect http HTTP_pol
 class type inspect http HTTP_Misuse
  reset
policy-map type inspect smtp SMTP_pol
 class type inspect smtp Large_Mail
  reset
policy-map type inspect central_remote
 class type inspect IP
  inspect
 class class-default
policy-map type inspect remote_central
 class type inspect ICMP
  inspect
 class type inspect other
  inspect
 class type inspect WEB
  inspect
  service-policy http HTTP_pol
 class type inspect MAIL
  inspect
  service-policy smtp SMTP_pol
 class class-default
!
zone security CENTRAL
zone security REMOTE
zone-pair security central_remote source CENTRAL destination REMOTE
 service-policy type inspect central_remote
zone-pair security remote_central source REMOTE destination CENTRAL
 service-policy type inspect remote_central
!
interface Loopback0
 ip address 10.5.5.5 255.255.255.0
!
interface Loopback5
 ip address 10.55.55.55 255.255.255.255
 ip nat inside
 ip virtual-reassembly
!
interface Loopback6
 ip address 192.168.55.5 255.255.255.0
!
interface FastEthernet0/0
 no ip address
 shutdown
 duplex auto
 speed auto
!
interface Serial0/0
 ip address 192.168.35.5 255.255.255.0
 ip nat outside
 ip virtual-reassembly
 zone-member security REMOTE
 encapsulation ppp
 ip ospf network point-to-point
 no fair-queue
 clock rate 2000000
 crypto map cryptomap1
!
interface FastEthernet0/1
 ip address 192.168.11.10 255.255.255.0
 duplex auto
 speed auto
 ntp broadcast
!
interface Serial0/1
 ip address 192.168.65.5 255.255.255.0
 zone-member security CENTRAL
 encapsulation frame-relay
 ip ospf network point-to-point
 clock rate 2000000
 frame-relay map ip 192.168.65.6 65 broadcast
 frame-relay intf-type dce
 crypto map cryptomap1
!
router ospf 1
 log-adjacency-changes
 network 10.5.5.0 0.0.0.255 area 0
 network 10.55.55.0 0.0.0.255 area 0
 network 192.168.35.0 0.0.0.255 area 0
 network 192.168.55.0 0.0.0.255 area 0
 network 192.168.65.0 0.0.0.255 area 0
!
ip forward-protocol nd
!
ip http server
no ip http secure-server
ip nat inside source route-map s0 interface Serial0/0 overload
ip nat inside source route-map s1 interface Serial0/1 overload
!
ip access-list extended crypto1
 permit ip host 10.5.5.5 host 10.8.8.8
!
access-list 100 permit ip any any
access-list 102 permit ip any host 10.55.55.55
!
route-map s1 permit 10
 match ip address 102
 match interface Serial0/1
!
route-map s0 permit 10
 match ip address 102
 match interface Serial0/0
!
control-plane
!
line con 0
 exec-timeout 0 0
 password cisco
 logging synchronous
 login
line aux 0
 exec-timeout 0 0
 password cisco
 logging synchronous
 login
 transport input telnet
line vty 0 4
 exec-timeout 0 0
 password cisco
 logging synchronous
 login
 transport input telnet
!
ntp authentication-key 1 md5 060506324F41 7
ntp authenticate
ntp trusted-key 1
ntp clock-period 17181052
ntp source Loopback0
ntp server 10.1.1.1 key 1
!
end
R5#


I then got the same results in the debug as before. When trying to initiate
the tunnel from the router I got the following


R5#ping 10.8.8.8 source loopback 0
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.8.8.8, timeout is 2 seconds:
Packet sent with a source address of 10.5.5.5
*Mar  1 00:18:15.768: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= 192.168.55.5, remote= 192.168.9.10,
    local_proxy= 10.5.5.5/255.255.255.255/0/0 (type=1),
    remote_proxy= 10.8.8.8/255.255.255.255/0/0 (type=1),
    protocol= ESP, transform= esp-aes esp-sha-hmac  (Tunnel),
    lifedur= 3600s and 4608000kb,
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
*Mar  1 00:18:15.788: ISAKMP:(0): SA request profile is isakmpprof1
*Mar  1 00:18:15.792: ISAKMP: Created a peer struct for 192.168.9.10, peer
port 500
*Mar  1 00:18:15.796: ISAKMP: New peer created peer = 0x66D65F88
peer_handle = 0x8000000E
*Mar  1 00:18:15.796: ISAKMP: Locking peer struct 0x66D65F88, refcount 1
for isakmp_initiator
*Mar  1 00:18:15.800: ISAKMP: local port 500, remote port 500
*Mar  1 00:18:15.804: ISAKMP: set new node 0 to QM_IDLE
*Mar  1 00:18:15.804: insert sa successfully sa = 677F9C40
*Mar  1 00:18:15.808: ISAKMP:(0):Can not start Aggressive mode, trying Main
mode.
*Mar  1 00:18:15.812: ISAKMP:(0):Profile has no keyring, aborting key search
*Mar  1 00:18:15.816: ISAKMP:(0):Profile has no keyring, aborting host key
search
*Mar  1 00:18:15.816: ISAKMP:(0): No Cert or pre-shared address key.
*Mar  1 00:18:15.820: ISAKMP:(0): construct_initial_message: Can not start
Main mode
*Mar  1 00:18:15.820: ISAKMP: Unlocking peer struct 0x66D65F88 for
isadb_unlock_peer_delete_sa(), count 0
*Mar  1 00:18:15.824: ISAKMP: Deleting peer node .by peer_reap for
192.168.9.10: 66D65F88
*Mar  1 00:18:15.828: ISAKMP:(0):purging SA., sa=677F9C40, delme=677F9C40
*Mar  1 00:18:15.832: ISAKMP:(0):purging node -439292819
*Mar  1 00:18:15.832: ISAKMP: Error while processing SA request: Failed to
initialize SA
*Mar  1 00:18:15.832: ISAKMP: Error while processing KMI message 0, error 2.
*Mar  1 00:18:15.832: IPSEC(key_engine): got a queue event with 1 KMI
message(s)....
Success rate is 0 percent (0/5)
R5#


When initiating the tunnel from the ASA I get the following debugs on the
router


R5#
*Mar  1 00:18:51.378: ISAKMP (0:0): received packet from 192.168.9.10 dport
500 sport 500 Global (N) NEW SA
*Mar  1 00:18:51.382: ISAKMP: Created a peer struct for 192.168.9.10, peer
port 500
*Mar  1 00:18:51.382: ISAKMP: New peer created peer = 0x66D65F88
peer_handle = 0x80000010
*Mar  1 00:18:51.386: ISAKMP: Locking peer struct 0x66D65F88, refcount 1
for crypto_isakmp_process_block
*Mar  1 00:18:51.390: ISAKMP: local port 500, remote port 500
*Mar  1 00:18:51.394: insert sa successfully sa = 677F9C40
*Mar  1 00:18:51.398: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar  1 00:18:51.398: ISAKMP:(0):Old State = IKE_READY  New State =
IKE_R_MM1
*Mar  1 00:18:51.414: ISAKMP:(0): processing SA payload. message ID = 0
*Mar  1 00:18:51.418: ISAKMP:(0): processing vendor id payload
*Mar  1 00:18:51.422: ISAKMP:(0): vendor ID seems Unity/DPD but major 123
mismatch
*Mar  1 00:18:51.426: ISAKMP:(0): vendor ID is NAT-T v2
*Mar  1 00:18:51.426: ISAKMP:(0): processing vendor id payload
*Mar  1 00:18:51.430: ISAKMP:(0): vendor ID seems Unity/DPD but major 157
mismatch
*Mar  1 00:18:51.430: ISAKMP:(0): vendor ID is NAT-T v3
*Mar  1 00:18:51.434: ISAKMP:(0): processing vendor id payload
*Mar  1 00:18:51.438: ISAKMP:(0): processing IKE frag vendor id payload
*Mar  1 00:18:51.438: ISAKMP:(0):Support for IKE Fragmentation not enabled
*Mar  1 00:18:51.442: ISAKMP : Scanning profiles for xauth ... isakmpprof1
*Mar  1 00:18:51.446: ISAKMP:(0):Checking ISAKMP transform 1 against
priority 11 policy
*Mar  1 00:18:51.446: ISAKMP:      default group 5
*Mar  1 00:18:51.450: ISAKMP:      encryption AES-CBC
*Mar  1 00:18:51.450: ISAKMP:      keylength of 128
*Mar  1 00:18:51.450: ISAKMP:      hash SHA
*Mar  1 00:18:51.454: ISAKMP:      auth RSA sig
*Mar  1 00:18:51.454: ISAKMP:      life type in seconds
*Mar  1 00:18:51.458: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
*Mar  1 00:18:51.462: ISAKMP:(0):RSA signature authentication offered but
does not match policy!
*Mar  1 00:18:51.466: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Mar  1 00:18:51.470: ISAKMP:(0):Checking ISAKMP transform 1 against
priority 65535 policy
*Mar  1 00:18:51.470: ISAKMP:      default group 5
*Mar  1 00:18:51.470: ISAKMP:      encryption AES-CBC
*Mar  1 00:18:51.474: ISAKMP:      keylength of 128
*Mar  1 00:18:51.474: ISAKMP:      hash SHA
*Mar  1 00:18:51.478: ISAKMP:      auth RSA sig
*Mar  1 00:18:51.478: ISAKMP:      life type in seconds
*Mar  1 00:18:51.478: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
*Mar  1 00:18:51.486: ISAKMP:(0):Encryption algorithm offered does not
match policy!
*Mar  1 00:18:51.490: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Mar  1 00:18:51.490: ISAKMP:(0):no offers accepted!
*Mar  1 00:18:51.490: ISAKMP:(0): phase 1 SA policy not acceptable! (local
192.168.55.5 remote 192.168.9.10)
*Mar  1 00:18:51.490: ISAKMP (0:0): incrementing error counter on sa,
attempt 1 of 5: construct_fail_ag_init
*Mar  1 00:18:51.490: ISAKMP:(0): sending packet to 192.168.9.10 my_port
500 peer_port 500 (R) MM_NO_STATE
*Mar  1 00:18:51.494: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Mar  1 00:18:51.498: ISAKMP:(0):peer does not do paranoid keepalives.
*Mar  1 00:18:51.502: ISAKMP:(0):deleting SA reason "Phase1 SA policy
proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10)
*Mar  1 00:18:51.506: ISAKMP:(0): processing vendor id payload
*Mar  1 00:18:51.506: ISAKMP:(0): vendor ID seems Unity/DPD but major 123
mismatch
*Mar  1 00:18:51.510: ISAKMP:(0): vendor ID is NAT-T v2
*Mar  1 00:18:51.514: ISAKMP:(0): processing vendor id payload
*Mar  1 00:18:51.514: ISAKMP:(0): vendor ID seems Unity/DPD but major 157
mismatch
*Mar  1 00:18:51.518: ISAKMP:(0): vendor ID is NAT-T v3
*Mar  1 00:18:51.522: ISAKMP:(0): processing vendor id payload
*Mar  1 00:18:51.522: ISAKMP:(0): processing IKE frag vendor id payload
*Mar  1 00:18:51.526: ISAKMP:(0):Support for IKE Fragmentation not enabled
*Mar  1 00:18:51.530: ISAKMP (0:0): FSM action returned error: 2
*Mar  1 00:18:51.530: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
*Mar  1 00:18:51.534: ISAKMP:(0):Old State = IKE_R_MM1  New State =
IKE_R_MM1
*Mar  1 00:18:51.566: ISAKMP:(0):deleting SA reason "Phase1 SA policy
proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10)
*Mar  1 00:18:51.566: ISAKMP: Unlocking peer struct 0x66D65F88 for
isadb_mark_sa_deleted(), count 0
*Mar  1 00:18:51.570: ISAKMP: Deleting peer node by peer_reap for
192.168.9.10: 66D65F88
*Mar  1 00:18:51.570: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
*Mar  1 00:18:51.574: ISAKMP:(0):Old State = IKE_R_MM1  New State =
IKE_DEST_SA
*Mar  1 00:18:51.578: IPSEC(key_engine): got a queue event with 1 KMI
message(s)
*Mar  1 00:18:51.598: ISAKMP:(0):deleting SA reason "No reason" state (R)
MM_NO_STATE (peer 192.168.9.10)
*Mar  1 00:18:51.602: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_ERROR
*Mar  1 00:18:51.606: ISAKMP:(0):Old State = IKE_DEST_SA  New State =
IKE_DEST_SA


I then decided to make the ISAKMP profile more basic and did the following


R5(config)# crypto isakmp profile isakmpprof1
R5(conf-isa-prof)# no self-identity fqdn
R5(conf-isa-prof)# no match certificate certmap1
R5(conf-isa-prof)# match identity address 192.168.9.10 255.255.255.255


Pinging from the router side then produced what seems to be the same debug
output below


Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.8.8.8, timeout is 2 seconds:
Packet sent with a source address of 10.5.5.5

*Mar  1 00:15:10.239: IPSEC(sa_request): ,
  (key eng. msg.) OUTBOUND local= 192.168.55.5, remote= 192.168.9.10,
    local_proxy= 10.5.5.5/255.255.255.255/0/0 (type=1),
    remote_proxy= 10.8.8.8/255.255.255.255/0/0 (type=1),
    protocol= ESP, transform= esp-aes esp-sha-hmac  (Tunnel),
    lifedur= 3600s and 4608000kb,
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0
*Mar  1 00:15:10.259: ISAKMP:(0): SA request profile is isakmpprof1
*Mar  1 00:15:10.263: ISAKMP: Created a peer struct for 192.168.9.10, peer
port 500
*Mar  1 00:15:10.267: ISAKMP: New peer created peer = 0x66D65F88
peer_handle = 0x8000000B
*Mar  1 00:15:10.267: ISAKMP: Locking peer struct 0x66D65F88, refcount 1
for isakmp_initiator
*Mar  1 00:15:10.271: ISAKMP: local port 500, remote port 500
*Mar  1 00:15:10.275: ISAKMP: set new node 0 to QM_IDLE
*Mar  1 00:15:10.275: insert sa successfully sa = 66F836E4
*Mar  1 00:15:10.279: ISAKMP:(0):Can not start Aggressive mode, trying Main
mode.
*Mar  1 00:15:10.283: ISAKMP:(0):Profile has no keyring, aborting key search
*Mar  1 00:15:10.287: ISAKMP:(0):Profile has no keyring, aborting host key
search
*Mar  1 00:15:10.287: ISAKMP:(0): No Cert or pre-shared address key.
*Mar  1 00:15:10.291: ISAKMP:(0): construct_initial_message: Can not start
Main mode
*Mar  1 00:15:10.291: ISAKMP: Unlocking peer struct 0x66D65F88 for
isadb_unlock_peer_delete_sa(), count 0
*Mar  1 00:15:10.295: ISAKMP: Deleting peer node by peer_reap for
192.168.9.10: 66D65F88.
*Mar  1 00:15:10.299: ISAKMP:(0):purging SA., sa=66F836E4, delme=66F836E4
*Mar  1 00:15:10.303: ISAKMP:(0):purging node 1282500099
*Mar  1 00:15:10.307: ISAKMP: Error while processing SA request: Failed to
initialize SA
*Mar  1 00:15:10.311: ISAKMP: Error while processing KMI message 0, error 2.
*Mar  1 00:15:10.311: IPSEC(key_engine): got a queue event with 1 KMI
message(s)....
Success rate is 0 percent (0/5)
R5#


Initiating from the ASA side gave the following output on the router


*Mar  1 00:16:03.471: ISAKMP (0:0): received packet from 192.168.9.10 dport
500 sport 500 Global (N) NEW SA
*Mar  1 00:16:03.475: ISAKMP: Created a peer struct for 192.168.9.10, peer
port 500
*Mar  1 00:16:03.475: ISAKMP: New peer created peer = 0x66D65F88
peer_handle = 0x8000000D
*Mar  1 00:16:03.479: ISAKMP: Locking peer struct 0x66D65F88, refcount 1
for crypto_isakmp_process_block
*Mar  1 00:16:03.483: ISAKMP: local port 500, remote port 500
*Mar  1 00:16:03.487: insert sa successfully sa = 66F836E4
*Mar  1 00:16:03.491: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar  1 00:16:03.491: ISAKMP:(0):Old State = IKE_READY  New State =
IKE_R_MM1
*Mar  1 00:16:03.511: ISAKMP:(0): processing SA payload. message ID = 0
*Mar  1 00:16:03.511: ISAKMP:(0): processing vendor id payload
*Mar  1 00:16:03.515: ISAKMP:(0): vendor ID seems Unity/DPD but major 123
mismatch
*Mar  1 00:16:03.519: ISAKMP:(0): vendor ID is NAT-T v2
*Mar  1 00:16:03.519: ISAKMP:(0): processing vendor id payload
*Mar  1 00:16:03.523: ISAKMP:(0): vendor ID seems Unity/DPD but major 157
mismatch
*Mar  1 00:16:03.527: ISAKMP:(0): vendor ID is NAT-T v3
*Mar  1 00:16:03.527: ISAKMP:(0): processing vendor id payload
*Mar  1 00:16:03.531: ISAKMP:(0): processing IKE frag vendor id payload
*Mar  1 00:16:03.535: ISAKMP:(0):Support for IKE Fragmentation not enabled
*Mar  1 00:16:03.535: ISAKMP : Scanning profiles for xauth ... isakmpprof1
*Mar  1 00:16:03.539: ISAKMP:(0):Checking ISAKMP transform 1 against
priority 11 policy
*Mar  1 00:16:03.543: ISAKMP:      default group 5
*Mar  1 00:16:03.543: ISAKMP:      encryption AES-CBC
*Mar  1 00:16:03.543: ISAKMP:      keylength of 128
*Mar  1 00:16:03.547: ISAKMP:      hash SHA
*Mar  1 00:16:03.547: ISAKMP:      auth RSA sig
*Mar  1 00:16:03.551: ISAKMP:      life type in seconds
*Mar  1 00:16:03.551: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
*Mar  1 00:16:03.555: ISAKMP:(0):RSA signature authentication offered but
does not match policy!
*Mar  1 00:16:03.559: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Mar  1 00:16:03.563: ISAKMP:(0):Checking ISAKMP transform 1 against
priority 65535 policy
*Mar  1 00:16:03.563: ISAKMP:      default group 5
*Mar  1 00:16:03.567: ISAKMP:      encryption AES-CBC
*Mar  1 00:16:03.567: ISAKMP:      keylength of 128
*Mar  1 00:16:03.567: ISAKMP:      hash SHA
*Mar  1 00:16:03.567: ISAKMP:      auth RSA sig
*Mar  1 00:16:03.567: ISAKMP:      life type in seconds
*Mar  1 00:16:03.567: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
*Mar  1 00:16:03.567: ISAKMP:(0):Encryption algorithm offered does not
match policy!
*Mar  1 00:16:03.567: ISAKMP:(0):atts are not acceptable. Next payload is 0
*Mar  1 00:16:03.567: ISAKMP:(0):no offers accepted!
*Mar  1 00:16:03.567: ISAKMP:(0): phase 1 SA policy not acceptable! (local
192.168.55.5 remote 192.168.9.10)
*Mar  1 00:16:03.567: ISAKMP (0:0): incrementing error counter on sa,
attempt 1 of 5: construct_fail_ag_init
*Mar  1 00:16:03.567: ISAKMP:(0): sending packet to 192.168.9.10 my_port
500 peer_port 500 (R) MM_NO_STATE
*Mar  1 00:16:03.567: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Mar  1 00:16:03.571: ISAKMP:(0):peer does not do paranoid keepalives.
*Mar  1 00:16:03.575: ISAKMP:(0):deleting SA reason "Phase1 SA policy
proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10)
*Mar  1 00:16:03.579: ISAKMP:(0): processing vendor id payload
*Mar  1 00:16:03.583: ISAKMP:(0): vendor ID seems Unity/DPD but major 123
mismatch
*Mar  1 00:16:03.583: ISAKMP:(0): vendor ID is NAT-T v2
*Mar  1 00:16:03.587: ISAKMP:(0): processing vendor id payload
*Mar  1 00:16:03.591: ISAKMP:(0): vendor ID seems Unity/DPD but major 157
mismatch
*Mar  1 00:16:03.591: ISAKMP:(0): vendor ID is NAT-T v3
*Mar  1 00:16:03.595: ISAKMP:(0): processing vendor id payload
*Mar  1 00:16:03.599: ISAKMP:(0): processing IKE frag vendor id payload
*Mar  1 00:16:03.599: ISAKMP:(0):Support for IKE Fragmentation not enabled
*Mar  1 00:16:03.603: ISAKMP (0:0): FSM action returned error: 2
*Mar  1 00:16:03.607: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
*Mar  1 00:16:03.607: ISAKMP:(0):Old State = IKE_R_MM1  New State =
IKE_R_MM1
*Mar  1 00:16:03.643: ISAKMP:(0):deleting SA reason "Phase1 SA policy
proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10)
*Mar  1 00:16:03.643: ISAKMP: Unlocking peer struct 0x66D65F88 for
isadb_mark_sa_deleted(), count 0
*Mar  1 00:16:03.647: ISAKMP: Deleting peer node by peer_reap for
192.168.9.10: 66D65F88
*Mar  1 00:16:03.651: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
*Mar  1 00:16:03.655: ISAKMP:(0):Old State = IKE_R_MM1  New State =
IKE_DEST_SA
*Mar  1 00:16:03.659: IPSEC(key_engine): got a queue event with 1 KMI
message(s)
*Mar  1 00:16:03.659: ISAKMP:(0):deleting SA reason "No reason" state (R)
MM_NO_STATE (peer 192.168.9.10)
*Mar  1 00:16:03.659: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_ERROR
*Mar  1 00:16:03.659: ISAKMP:(0):Old State = IKE_DEST_SA  New State =
IKE_DEST_SA
*Mar  1 00:16:10.251: IPSEC(key_engine): request timer fired: count = 2,
  (identity) local= 192.168.55.5, remote= 192.168.9.10,
    local_proxy= 10.5.5.5/255.255.255.255/0/0 (type=1),
    remote_proxy= 10.8.8.8/255.255.255.255/0/0 (type=1)
*Mar  1 00:16:11.419: ISAKMP (0:0): received packet from 192.168.9.10 dport
500 sport 500 Global (R) MM_NO_STATE
R5#
R5#


If anyone can shed some light on this or give some further suggestions I
would appreciate it.

Thanks
Ben









On Sun, Jun 24, 2012 at 1:43 AM, Imre Oszkar <[email protected]> wrote:

> Hi Ben
>
> Can you try this:
>
>  crypto map cryptomap1 10 ipsec-isakmp
>   set isakmp-profile isakmpprof1
>
>
> Oszkar
>
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
> Are you a CCNP or CCIE and looking for a job? Check out
> www.PlatinumPlacement.com
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to