That's Yusuf lab on IPE racks. wr mem and reload the ASA, that should fix the problem.
When you run debugs on the IOS, you can see that ASA is sending the unexpected key length in IKE policies to the r5. With regards Kings On Sun, Jun 24, 2012 at 12:21 PM, Ben Shaw <[email protected]> wrote: > Hi All, > > I was under the impression that the application of the ISAKMP profile > allows the trustpoint to be chosen and used to authenticate a peer based on > the match commands configured in the profile. For this reason I had the > understanding it was more about which trustpoint to compare a certificate > received from an IPSec pair against, not for deciding which trustpoints ID > certificate is to be sent to the peer when initiating an tunnel. Anyway, I > have added the ISAKMP profile to the and still have the same issues. > > I first configured the following on R5 (which by the way is not the CA, > the CA is another router - R1) > > > R5(config)#crypto map cryptomap1 10 ipsec-isakmp > R5(config-crypto-map)#set isakmp-profile isakmpprof1 > > > The resulant configuration was as follows > > > R5#show running-config > Building configuration... > > Current configuration : 7300 bytes > ! > version 12.4 > service timestamps debug datetime msec > service timestamps log datetime msec > no service password-encryption > ! > hostname R5 > ! > boot-start-marker > boot-end-marker > ! > enable password cisco > ! > no aaa new-model > memory-size iomem 5 > ip cef > ! > no ip domain lookup > ip domain name cisco.com > ! > frame-relay switching > multilink bundle-name authenticated > ! > parameter-map type inspect SMTP > sessions maximum 2147483647 > parameter-map type regex EMAIL > pattern [email protected] > > ! > crypto pki trustpoint myCA > enrollment url http://10.1.1.1:80 > fqdn R5.cisco.com > ip-address 10.5.5.5 > subject-name cn=R5 > revocation-check none > rsakeypair myCA-KEYS > ! > crypto pki certificate map certmap1 10 > issuer-name co myca > subject-name co asa2 > ! > crypto pki certificate chain myCA > certificate 06 > 19311730 15060355 0403130E 6D794341 2E636973 636F2E63 6F6D301E 170D3132 > > quit > certificate ca 01 > 3082020B 30820174 A0030201 02020101 300D0609 2A864886 F70D0101 05050030 > quit > ! > archive > log config > hidekeys > > ! > crypto isakmp policy 11 > encr aes > group 5 > crypto isakmp identity dn > crypto isakmp profile isakmpprof1 > self-identity fqdn > ca trust-point myCA > match certificate certmap1 > ! > crypto ipsec transform-set aes-sha esp-aes esp-sha-hmac > ! > crypto map cryptomap1 local-address Loopback6 > crypto map cryptomap1 10 ipsec-isakmp > set peer 192.168.9.10 > set transform-set aes-sha > set isakmp-profile isakmpprof1 > match address crypto1 > ! > ip tcp synwait-time 5 > ! > class-map type inspect match-all MAIL > match protocol smtp > class-map type inspect match-all ICMP > match protocol icmp > class-map type inspect match-all IP > match access-group 100 > class-map type inspect smtp match-any Large_Mail > match data-length gt 10000000 > class-map type inspect match-all ALL > class-map type inspect match-all WEB > match protocol http > class-map type inspect match-any other > match protocol telnet > match protocol ssh > class-map type inspect http match-all HTTP_Misuse > match request port-misuse any > ! > policy-map type inspect http HTTP_pol > class type inspect http HTTP_Misuse > reset > policy-map type inspect smtp SMTP_pol > class type inspect smtp Large_Mail > reset > policy-map type inspect central_remote > class type inspect IP > inspect > class class-default > policy-map type inspect remote_central > class type inspect ICMP > inspect > class type inspect other > inspect > class type inspect WEB > inspect > service-policy http HTTP_pol > class type inspect MAIL > inspect > service-policy smtp SMTP_pol > class class-default > ! > zone security CENTRAL > zone security REMOTE > zone-pair security central_remote source CENTRAL destination REMOTE > service-policy type inspect central_remote > zone-pair security remote_central source REMOTE destination CENTRAL > service-policy type inspect remote_central > > ! > interface Loopback0 > ip address 10.5.5.5 255.255.255.0 > ! > interface Loopback5 > ip address 10.55.55.55 255.255.255.255 > ip nat inside > ip virtual-reassembly > > ! > interface Loopback6 > ip address 192.168.55.5 255.255.255.0 > ! > interface FastEthernet0/0 > no ip address > shutdown > duplex auto > speed auto > > ! > interface Serial0/0 > ip address 192.168.35.5 255.255.255.0 > ip nat outside > ip virtual-reassembly > zone-member security REMOTE > encapsulation ppp > ip ospf network point-to-point > no fair-queue > clock rate 2000000 > crypto map cryptomap1 > ! > interface FastEthernet0/1 > ip address 192.168.11.10 255.255.255.0 > duplex auto > speed auto > ntp broadcast > > ! > interface Serial0/1 > ip address 192.168.65.5 255.255.255.0 > zone-member security CENTRAL > encapsulation frame-relay > ip ospf network point-to-point > clock rate 2000000 > frame-relay map ip 192.168.65.6 65 broadcast > frame-relay intf-type dce > crypto map cryptomap1 > ! > router ospf 1 > log-adjacency-changes > network 10.5.5.0 0.0.0.255 area 0 > network 10.55.55.0 0.0.0.255 area 0 > network 192.168.35.0 0.0.0.255 area 0 > network 192.168.55.0 0.0.0.255 area 0 > network 192.168.65.0 0.0.0.255 area 0 > ! > ip forward-protocol nd > ! > ip http server > no ip http secure-server > ip nat inside source route-map s0 interface Serial0/0 overload > ip nat inside source route-map s1 interface Serial0/1 overload > > ! > ip access-list extended crypto1 > permit ip host 10.5.5.5 host 10.8.8.8 > ! > access-list 100 permit ip any any > access-list 102 permit ip any host 10.55.55.55 > ! > route-map s1 permit 10 > match ip address 102 > match interface Serial0/1 > ! > route-map s0 permit 10 > match ip address 102 > match interface Serial0/0 > ! > control-plane > ! > line con 0 > exec-timeout 0 0 > password cisco > logging synchronous > login > line aux 0 > exec-timeout 0 0 > password cisco > logging synchronous > login > transport input telnet > line vty 0 4 > exec-timeout 0 0 > password cisco > logging synchronous > login > transport input telnet > ! > ntp authentication-key 1 md5 060506324F41 7 > ntp authenticate > ntp trusted-key 1 > ntp clock-period 17181052 > ntp source Loopback0 > ntp server 10.1.1.1 key 1 > ! > end > R5# > > > I then got the same results in the debug as before. When trying to > initiate the tunnel from the router I got the following > > > > R5#ping 10.8.8.8 source loopback 0 > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 10.8.8.8, timeout is 2 seconds: > Packet sent with a source address of 10.5.5.5 > *Mar 1 00:18:15.768: IPSEC(sa_request): , > > (key eng. msg.) OUTBOUND local= 192.168.55.5, remote= 192.168.9.10, > local_proxy= 10.5.5.5/255.255.255.255/0/0 (type=1), > remote_proxy= 10.8.8.8/255.255.255.255/0/0 (type=1), > protocol= ESP, transform= esp-aes esp-sha-hmac (Tunnel), > lifedur= 3600s and 4608000kb, > spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0 > *Mar 1 00:18:15.788: ISAKMP:(0): SA request profile is isakmpprof1 > *Mar 1 00:18:15.792: ISAKMP: Created a peer struct for 192.168.9.10, peer > port 500 > *Mar 1 00:18:15.796: ISAKMP: New peer created peer = 0x66D65F88 > peer_handle = 0x8000000E > *Mar 1 00:18:15.796: ISAKMP: Locking peer struct 0x66D65F88, refcount 1 > for isakmp_initiator > *Mar 1 00:18:15.800: ISAKMP: local port 500, remote port 500 > *Mar 1 00:18:15.804: ISAKMP: set new node 0 to QM_IDLE > *Mar 1 00:18:15.804: insert sa successfully sa = 677F9C40 > *Mar 1 00:18:15.808: ISAKMP:(0):Can not start Aggressive mode, trying > Main mode. > *Mar 1 00:18:15.812: ISAKMP:(0):Profile has no keyring, aborting key > search > *Mar 1 00:18:15.816: ISAKMP:(0):Profile has no keyring, aborting host key > search > *Mar 1 00:18:15.816: ISAKMP:(0): No Cert or pre-shared address key. > *Mar 1 00:18:15.820: ISAKMP:(0): construct_initial_message: Can not start > Main mode > *Mar 1 00:18:15.820: ISAKMP: Unlocking peer struct 0x66D65F88 for > isadb_unlock_peer_delete_sa(), count 0 > *Mar 1 00:18:15.824: ISAKMP: Deleting peer node .by peer_reap for > 192.168.9.10: 66D65F88 > *Mar 1 00:18:15.828: ISAKMP:(0):purging SA., sa=677F9C40, delme=677F9C40 > *Mar 1 00:18:15.832: ISAKMP:(0):purging node -439292819 > *Mar 1 00:18:15.832: ISAKMP: Error while processing SA request: Failed to > initialize SA > *Mar 1 00:18:15.832: ISAKMP: Error while processing KMI message 0, error > 2. > *Mar 1 00:18:15.832: IPSEC(key_engine): got a queue event with 1 KMI > message(s).... > > Success rate is 0 percent (0/5) > R5# > > > When initiating the tunnel from the ASA I get the following debugs on the > router > > > R5# > *Mar 1 00:18:51.378: ISAKMP (0:0): received packet from 192.168.9.10 > dport 500 sport 500 Global (N) NEW SA > *Mar 1 00:18:51.382: ISAKMP: Created a peer struct for 192.168.9.10, peer > port 500 > *Mar 1 00:18:51.382: ISAKMP: New peer created peer = 0x66D65F88 > peer_handle = 0x80000010 > *Mar 1 00:18:51.386: ISAKMP: Locking peer struct 0x66D65F88, refcount 1 > for crypto_isakmp_process_block > *Mar 1 00:18:51.390: ISAKMP: local port 500, remote port 500 > *Mar 1 00:18:51.394: insert sa successfully sa = 677F9C40 > *Mar 1 00:18:51.398: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH > *Mar 1 00:18:51.398: ISAKMP:(0):Old State = IKE_READY New State = > IKE_R_MM1 > *Mar 1 00:18:51.414: ISAKMP:(0): processing SA payload. message ID = 0 > *Mar 1 00:18:51.418: ISAKMP:(0): processing vendor id payload > *Mar 1 00:18:51.422: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 > mismatch > *Mar 1 00:18:51.426: ISAKMP:(0): vendor ID is NAT-T v2 > *Mar 1 00:18:51.426: ISAKMP:(0): processing vendor id payload > *Mar 1 00:18:51.430: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 > mismatch > *Mar 1 00:18:51.430: ISAKMP:(0): vendor ID is NAT-T v3 > *Mar 1 00:18:51.434: ISAKMP:(0): processing vendor id payload > *Mar 1 00:18:51.438: ISAKMP:(0): processing IKE frag vendor id payload > *Mar 1 00:18:51.438: ISAKMP:(0):Support for IKE Fragmentation not enabled > *Mar 1 00:18:51.442: ISAKMP : Scanning profiles for xauth ... isakmpprof1 > *Mar 1 00:18:51.446: ISAKMP:(0):Checking ISAKMP transform 1 against > priority 11 policy > *Mar 1 00:18:51.446: ISAKMP: default group 5 > *Mar 1 00:18:51.450: ISAKMP: encryption AES-CBC > *Mar 1 00:18:51.450: ISAKMP: keylength of 128 > *Mar 1 00:18:51.450: ISAKMP: hash SHA > *Mar 1 00:18:51.454: ISAKMP: auth RSA sig > *Mar 1 00:18:51.454: ISAKMP: life type in seconds > *Mar 1 00:18:51.458: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 > 0x80 > *Mar 1 00:18:51.462: ISAKMP:(0):RSA signature authentication offered but > does not match policy! > *Mar 1 00:18:51.466: ISAKMP:(0):atts are not acceptable. Next payload is 0 > *Mar 1 00:18:51.470: ISAKMP:(0):Checking ISAKMP transform 1 against > priority 65535 policy > *Mar 1 00:18:51.470: ISAKMP: default group 5 > *Mar 1 00:18:51.470: ISAKMP: encryption AES-CBC > *Mar 1 00:18:51.474: ISAKMP: keylength of 128 > *Mar 1 00:18:51.474: ISAKMP: hash SHA > *Mar 1 00:18:51.478: ISAKMP: auth RSA sig > *Mar 1 00:18:51.478: ISAKMP: life type in seconds > *Mar 1 00:18:51.478: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 > 0x80 > *Mar 1 00:18:51.486: ISAKMP:(0):Encryption algorithm offered does not > match policy! > *Mar 1 00:18:51.490: ISAKMP:(0):atts are not acceptable. Next payload is 0 > *Mar 1 00:18:51.490: ISAKMP:(0):no offers accepted! > *Mar 1 00:18:51.490: ISAKMP:(0): phase 1 SA policy not acceptable! (local > 192.168.55.5 remote 192.168.9.10) > *Mar 1 00:18:51.490: ISAKMP (0:0): incrementing error counter on sa, > attempt 1 of 5: construct_fail_ag_init > *Mar 1 00:18:51.490: ISAKMP:(0): sending packet to 192.168.9.10 my_port > 500 peer_port 500 (R) MM_NO_STATE > *Mar 1 00:18:51.494: ISAKMP:(0):Sending an IKE IPv4 Packet. > *Mar 1 00:18:51.498: ISAKMP:(0):peer does not do paranoid keepalives. > *Mar 1 00:18:51.502: ISAKMP:(0):deleting SA reason "Phase1 SA policy > proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10) > *Mar 1 00:18:51.506: ISAKMP:(0): processing vendor id payload > *Mar 1 00:18:51.506: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 > mismatch > *Mar 1 00:18:51.510: ISAKMP:(0): vendor ID is NAT-T v2 > *Mar 1 00:18:51.514: ISAKMP:(0): processing vendor id payload > *Mar 1 00:18:51.514: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 > mismatch > *Mar 1 00:18:51.518: ISAKMP:(0): vendor ID is NAT-T v3 > *Mar 1 00:18:51.522: ISAKMP:(0): processing vendor id payload > *Mar 1 00:18:51.522: ISAKMP:(0): processing IKE frag vendor id payload > *Mar 1 00:18:51.526: ISAKMP:(0):Support for IKE Fragmentation not enabled > *Mar 1 00:18:51.530: ISAKMP (0:0): FSM action returned error: 2 > *Mar 1 00:18:51.530: ISAKMP:(0):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_MAIN_MODE > *Mar 1 00:18:51.534: ISAKMP:(0):Old State = IKE_R_MM1 New State = > IKE_R_MM1 > *Mar 1 00:18:51.566: ISAKMP:(0):deleting SA reason "Phase1 SA policy > proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10) > *Mar 1 00:18:51.566: ISAKMP: Unlocking peer struct 0x66D65F88 for > isadb_mark_sa_deleted(), count 0 > *Mar 1 00:18:51.570: ISAKMP: Deleting peer node by peer_reap for > 192.168.9.10: 66D65F88 > *Mar 1 00:18:51.570: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL > *Mar 1 00:18:51.574: ISAKMP:(0):Old State = IKE_R_MM1 New State = > IKE_DEST_SA > *Mar 1 00:18:51.578: IPSEC(key_engine): got a queue event with 1 KMI > message(s) > *Mar 1 00:18:51.598: ISAKMP:(0):deleting SA reason "No reason" state (R) > MM_NO_STATE (peer 192.168.9.10) > *Mar 1 00:18:51.602: ISAKMP:(0):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_ERROR > *Mar 1 00:18:51.606: ISAKMP:(0):Old State = IKE_DEST_SA New State = > IKE_DEST_SA > > > I then decided to make the ISAKMP profile more basic and did the following > > > R5(config)# crypto isakmp profile isakmpprof1 > R5(conf-isa-prof)# no self-identity fqdn > R5(conf-isa-prof)# no match certificate certmap1 > R5(conf-isa-prof)# match identity address 192.168.9.10 255.255.255.255 > > > Pinging from the router side then produced what seems to be the same debug > output below > > > > Type escape sequence to abort. > Sending 5, 100-byte ICMP Echos to 10.8.8.8, timeout is 2 seconds: > Packet sent with a source address of 10.5.5.5 > > *Mar 1 00:15:10.239: IPSEC(sa_request): , > > (key eng. msg.) OUTBOUND local= 192.168.55.5, remote= 192.168.9.10, > local_proxy= 10.5.5.5/255.255.255.255/0/0 (type=1), > remote_proxy= 10.8.8.8/255.255.255.255/0/0 (type=1), > protocol= ESP, transform= esp-aes esp-sha-hmac (Tunnel), > lifedur= 3600s and 4608000kb, > spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x0 > *Mar 1 00:15:10.259: ISAKMP:(0): SA request profile is isakmpprof1 > *Mar 1 00:15:10.263: ISAKMP: Created a peer struct for 192.168.9.10, peer > port 500 > *Mar 1 00:15:10.267: ISAKMP: New peer created peer = 0x66D65F88 > peer_handle = 0x8000000B > *Mar 1 00:15:10.267: ISAKMP: Locking peer struct 0x66D65F88, refcount 1 > for isakmp_initiator > *Mar 1 00:15:10.271: ISAKMP: local port 500, remote port 500 > *Mar 1 00:15:10.275: ISAKMP: set new node 0 to QM_IDLE > *Mar 1 00:15:10.275: insert sa successfully sa = 66F836E4 > *Mar 1 00:15:10.279: ISAKMP:(0):Can not start Aggressive mode, trying > Main mode. > *Mar 1 00:15:10.283: ISAKMP:(0):Profile has no keyring, aborting key > search > *Mar 1 00:15:10.287: ISAKMP:(0):Profile has no keyring, aborting host key > search > *Mar 1 00:15:10.287: ISAKMP:(0): No Cert or pre-shared address key. > *Mar 1 00:15:10.291: ISAKMP:(0): construct_initial_message: Can not start > Main mode > *Mar 1 00:15:10.291: ISAKMP: Unlocking peer struct 0x66D65F88 for > isadb_unlock_peer_delete_sa(), count 0 > *Mar 1 00:15:10.295: ISAKMP: Deleting peer node by peer_reap for > 192.168.9.10: 66D65F88. > *Mar 1 00:15:10.299: ISAKMP:(0):purging SA., sa=66F836E4, delme=66F836E4 > *Mar 1 00:15:10.303: ISAKMP:(0):purging node 1282500099 > *Mar 1 00:15:10.307: ISAKMP: Error while processing SA request: Failed to > initialize SA > *Mar 1 00:15:10.311: ISAKMP: Error while processing KMI message 0, error > 2. > *Mar 1 00:15:10.311: IPSEC(key_engine): got a queue event with 1 KMI > message(s).... > > Success rate is 0 percent (0/5) > R5# > > > Initiating from the ASA side gave the following output on the router > > > *Mar 1 00:16:03.471: ISAKMP (0:0): received packet from 192.168.9.10 > dport 500 sport 500 Global (N) NEW SA > *Mar 1 00:16:03.475: ISAKMP: Created a peer struct for 192.168.9.10, peer > port 500 > *Mar 1 00:16:03.475: ISAKMP: New peer created peer = 0x66D65F88 > peer_handle = 0x8000000D > *Mar 1 00:16:03.479: ISAKMP: Locking peer struct 0x66D65F88, refcount 1 > for crypto_isakmp_process_block > *Mar 1 00:16:03.483: ISAKMP: local port 500, remote port 500 > *Mar 1 00:16:03.487: insert sa successfully sa = 66F836E4 > *Mar 1 00:16:03.491: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH > *Mar 1 00:16:03.491: ISAKMP:(0):Old State = IKE_READY New State = > IKE_R_MM1 > *Mar 1 00:16:03.511: ISAKMP:(0): processing SA payload. message ID = 0 > *Mar 1 00:16:03.511: ISAKMP:(0): processing vendor id payload > *Mar 1 00:16:03.515: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 > mismatch > *Mar 1 00:16:03.519: ISAKMP:(0): vendor ID is NAT-T v2 > *Mar 1 00:16:03.519: ISAKMP:(0): processing vendor id payload > *Mar 1 00:16:03.523: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 > mismatch > *Mar 1 00:16:03.527: ISAKMP:(0): vendor ID is NAT-T v3 > *Mar 1 00:16:03.527: ISAKMP:(0): processing vendor id payload > *Mar 1 00:16:03.531: ISAKMP:(0): processing IKE frag vendor id payload > *Mar 1 00:16:03.535: ISAKMP:(0):Support for IKE Fragmentation not enabled > *Mar 1 00:16:03.535: ISAKMP : Scanning profiles for xauth ... isakmpprof1 > *Mar 1 00:16:03.539: ISAKMP:(0):Checking ISAKMP transform 1 against > priority 11 policy > *Mar 1 00:16:03.543: ISAKMP: default group 5 > *Mar 1 00:16:03.543: ISAKMP: encryption AES-CBC > *Mar 1 00:16:03.543: ISAKMP: keylength of 128 > *Mar 1 00:16:03.547: ISAKMP: hash SHA > *Mar 1 00:16:03.547: ISAKMP: auth RSA sig > *Mar 1 00:16:03.551: ISAKMP: life type in seconds > *Mar 1 00:16:03.551: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 > 0x80 > *Mar 1 00:16:03.555: ISAKMP:(0):RSA signature authentication offered but > does not match policy! > *Mar 1 00:16:03.559: ISAKMP:(0):atts are not acceptable. Next payload is 0 > *Mar 1 00:16:03.563: ISAKMP:(0):Checking ISAKMP transform 1 against > priority 65535 policy > *Mar 1 00:16:03.563: ISAKMP: default group 5 > *Mar 1 00:16:03.567: ISAKMP: encryption AES-CBC > *Mar 1 00:16:03.567: ISAKMP: keylength of 128 > *Mar 1 00:16:03.567: ISAKMP: hash SHA > *Mar 1 00:16:03.567: ISAKMP: auth RSA sig > *Mar 1 00:16:03.567: ISAKMP: life type in seconds > *Mar 1 00:16:03.567: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 > 0x80 > *Mar 1 00:16:03.567: ISAKMP:(0):Encryption algorithm offered does not > match policy! > *Mar 1 00:16:03.567: ISAKMP:(0):atts are not acceptable. Next payload is 0 > *Mar 1 00:16:03.567: ISAKMP:(0):no offers accepted! > *Mar 1 00:16:03.567: ISAKMP:(0): phase 1 SA policy not acceptable! (local > 192.168.55.5 remote 192.168.9.10) > *Mar 1 00:16:03.567: ISAKMP (0:0): incrementing error counter on sa, > attempt 1 of 5: construct_fail_ag_init > *Mar 1 00:16:03.567: ISAKMP:(0): sending packet to 192.168.9.10 my_port > 500 peer_port 500 (R) MM_NO_STATE > *Mar 1 00:16:03.567: ISAKMP:(0):Sending an IKE IPv4 Packet. > *Mar 1 00:16:03.571: ISAKMP:(0):peer does not do paranoid keepalives. > *Mar 1 00:16:03.575: ISAKMP:(0):deleting SA reason "Phase1 SA policy > proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10) > *Mar 1 00:16:03.579: ISAKMP:(0): processing vendor id payload > *Mar 1 00:16:03.583: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 > mismatch > *Mar 1 00:16:03.583: ISAKMP:(0): vendor ID is NAT-T v2 > *Mar 1 00:16:03.587: ISAKMP:(0): processing vendor id payload > *Mar 1 00:16:03.591: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 > mismatch > *Mar 1 00:16:03.591: ISAKMP:(0): vendor ID is NAT-T v3 > *Mar 1 00:16:03.595: ISAKMP:(0): processing vendor id payload > *Mar 1 00:16:03.599: ISAKMP:(0): processing IKE frag vendor id payload > *Mar 1 00:16:03.599: ISAKMP:(0):Support for IKE Fragmentation not enabled > *Mar 1 00:16:03.603: ISAKMP (0:0): FSM action returned error: 2 > *Mar 1 00:16:03.607: ISAKMP:(0):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_MAIN_MODE > *Mar 1 00:16:03.607: ISAKMP:(0):Old State = IKE_R_MM1 New State = > IKE_R_MM1 > *Mar 1 00:16:03.643: ISAKMP:(0):deleting SA reason "Phase1 SA policy > proposal not accepted" state (R) MM_NO_STATE (peer 192.168.9.10) > *Mar 1 00:16:03.643: ISAKMP: Unlocking peer struct 0x66D65F88 for > isadb_mark_sa_deleted(), count 0 > *Mar 1 00:16:03.647: ISAKMP: Deleting peer node by peer_reap for > 192.168.9.10: 66D65F88 > *Mar 1 00:16:03.651: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL > *Mar 1 00:16:03.655: ISAKMP:(0):Old State = IKE_R_MM1 New State = > IKE_DEST_SA > *Mar 1 00:16:03.659: IPSEC(key_engine): got a queue event with 1 KMI > message(s) > *Mar 1 00:16:03.659: ISAKMP:(0):deleting SA reason "No reason" state (R) > MM_NO_STATE (peer 192.168.9.10) > *Mar 1 00:16:03.659: ISAKMP:(0):Input = IKE_MESG_INTERNAL, > IKE_PROCESS_ERROR > *Mar 1 00:16:03.659: ISAKMP:(0):Old State = IKE_DEST_SA New State = > IKE_DEST_SA > *Mar 1 00:16:10.251: IPSEC(key_engine): request timer fired: count = 2, > (identity) local= 192.168.55.5, remote= 192.168.9.10, > > local_proxy= 10.5.5.5/255.255.255.255/0/0 (type=1), > remote_proxy= 10.8.8.8/255.255.255.255/0/0 (type=1) > *Mar 1 00:16:11.419: ISAKMP (0:0): received packet from 192.168.9.10 > dport 500 sport 500 Global (R) MM_NO_STATE > R5# > R5# > > > If anyone can shed some light on this or give some further suggestions I > would appreciate it. > > Thanks > Ben > > > > > > > > > > On Sun, Jun 24, 2012 at 1:43 AM, Imre Oszkar <[email protected]> wrote: > >> Hi Ben >> >> Can you try this: >> >> crypto map cryptomap1 10 ipsec-isakmp >> set isakmp-profile isakmpprof1 >> >> >> Oszkar >> >> >> _______________________________________________ >> For more information regarding industry leading CCIE Lab training, please >> visit www.ipexpert.com >> >> Are you a CCNP or CCIE and looking for a job? Check out >> www.PlatinumPlacement.com >> > > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > Are you a CCNP or CCIE and looking for a job? Check out > www.PlatinumPlacement.com >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
