After keys successful export/import I ran into a weird problem.
There are two KS running in a coop mode.
They can easily communicate between each other via IP/ICMP but can't establish 
GETVPN peer KS relationships.

I'm seeing the error:
"*Jul 16 19:39:44: %GDOI-3-COOP_KS_UNREACH: Cooperative KS 141.1.123.9 
Unreachable in group GETVPN-GR"
And what is more important is that they can't negotiate IKE policy:

*Jul 16 19:40:24: %CRYPTO-4-IKE_DEFAULT_POLICY_ACCEPTED: IKE default policy was 
matched and is being used.

I have absolutely identical IKE policy setup on both KS servers:

R1:
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
crypto isakmp key CISCO123 address 143.1.123.0 255.255.255.0
crypto isakmp keepalive 15 periodic

R9:
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
crypto isakmp key CISCO123 address 143.1.123.0 255.255.255.0
crypto isakmp keepalive 15 periodic

I see that their running IKE policies match what I have configured:

R1:
Global IKE policy
Protection suite of priority 10
        encryption algorithm:   Three key triple DES
        hash algorithm:         Message Digest 5
        authentication method:  Pre-Shared Key
        Diffie-Hellman group:   #1 (768 bit)
        lifetime:               86400 seconds, no volume limit
Default protection suite
        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).
        hash algorithm:         Secure Hash Standard
        authentication method:  Rivest-Shamir-Adleman Signature
        Diffie-Hellman group:   #1 (768 bit)
        lifetime:               86400 seconds, no volume limit

R9:
Global IKE policy
Protection suite of priority 10
        encryption algorithm:   Three key triple DES
        hash algorithm:         Message Digest 5
        authentication method:  Pre-Shared Key
        Diffie-Hellman group:   #1 (768 bit)
        lifetime:               86400 seconds, no volume limit
Default protection suite
        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).
        hash algorithm:         Secure Hash Standard
        authentication method:  Rivest-Shamir-Adleman Signature
        Diffie-Hellman group:   #1 (768 bit)
        lifetime:               86400 seconds, no volume limit


GDOI part on both routers is configured as follows:

R1:
crypto gdoi group GETVPN-GR
identity number 123
server local
  rekey address ipv4 REKEY-ACL
  rekey lifetime seconds 400
  rekey retransmit 10 number 2
  rekey authentication mypubkey rsa GETVPN-KEYS
  sa ipsec 1
   profile GETVPN-IPSEC-PROF
   match address ipv4 GETVPN-ICMP-ACL
   replay counter window-size 64
  address ipv4 141.1.123.1
  redundancy
   local priority 100
   peer address ipv4 141.1.123.9

R9:
crypto gdoi group GETVPN-GR
identity number 123
server local
  rekey address ipv4 REKEY-ACL
  rekey lifetime seconds 400
  rekey retransmit 10 number 2
  rekey authentication mypubkey rsa GETVPN-KEYS
  sa ipsec 1
   profile GETVPN-IPSEC-PROF
   match address ipv4 GETVPN-ICMP-ACL
   replay counter window-size 64
  address ipv4 141.1.123.9
  redundancy
   local priority 50
   peer address ipv4 141.1.123.1

And finally, when I debug ISAKMP on one of the routers I see that they indeed 
don't use ISAKMP policy 10. What drives me insane is that the router can't find 
the preshared key.

Jul 17 02:48:30.603: ISAKMP: Created a peer struct for 141.1.123.1, peer port 
848
Jul 17 02:48:30.603: ISAKMP: New peer created peer = 0x641F4E4C peer_handle = 
0x80000009
Jul 17 02:48:30.603: ISAKMP: Locking peer struct 0x641F4E4C, refcount 1 for 
crypto_isakmp_process_block
Jul 17 02:48:30.603: ISAKMP: local port 848, remote port 848
Jul 17 02:48:30.603: ISAKMP: Find a dup sa in the avl tree during calling 
isadb_insert sa = 6438DB5C
Jul 17 02:48:30.603: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jul 17 02:48:30.607: ISAKMP:(0):Old State = IKE_READY  New State = IKE_R_MM1
Jul 17 02:48:30.607: ISAKMP:(0): processing SA payload. message ID = 0
Jul 17 02:48:30.607: ISAKMP:(0):Switching to SW IKE SA: sa is 6438DB5C, ce_id 
is 80000002
Jul 17 02:48:30.607: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.607: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jul 17 02:48:30.607: ISAKMP (0:0): vendor ID is NAT-T RFC 3947
Jul 17 02:48:30.607: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.607: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 
mismatch
Jul 17 02:48:30.607: ISAKMP (0:0): vendor ID is NAT-T v7
Jul 17 02:48:30.607: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.607: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 
mismatch
Jul 17 02:48:30.607: ISAKMP:(0): vendor ID is NAT-T v3
Jul 17 02:48:30.607: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.607: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 
mismatch
Jul 17 02:48:30.607: ISAKMP:(0): vendor ID is NAT-T v2
Jul 17 02:48:30.607: ISAKMP:(0):No pre-shared key with 141.1.123.1!
Jul 17 02:48:30.607: ISAKMP : Scanning profiles for xauth ...
Jul 17 02:48:30.607: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 
policy
Jul 17 02:48:30.607: ISAKMP:      encryption DES-CBC
Jul 17 02:48:30.607: ISAKMP:      hash SHA
Jul 17 02:48:30.607: ISAKMP:      default group 1
Jul 17 02:48:30.607: ISAKMP:      auth RSA sig
Jul 17 02:48:30.607: ISAKMP:      life type in seconds
Jul 17 02:48:30.607: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
Jul 17 02:48:30.607: ISAKMP:(0):Encryption algorithm offered does not match 
policy!
Jul 17 02:48:30.607: ISAKMP:(0):atts are not acceptable. Next payload is 0
Jul 17 02:48:30.607: ISAKMP:(0):Checking ISAKMP transform 1 against priority 
65535 policy
Jul 17 02:48:30.607: ISAKMP:      encryption DES-CBC
Jul 17 02:48:30.607: ISAKMP:      hash SHA
Jul 17 02:48:30.607: ISAKMP:      default group 1
Jul 17 02:48:30.607: ISAKMP:      auth RSA sig
Jul 17 02:48:30.611: ISAKMP:      life type in seconds
Jul 17 02:48:30.611: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
Jul 17 02:48:30.611: ISAKMP:(0):atts are acceptable. Next payload is 0
Jul 17 02:48:30.611: ISAKMP:(0):Acceptable atts:actual life: 0
Jul 17 02:48:30.611: ISAKMP:(0):Acceptable atts:life: 0
Jul 17 02:48:30.611: ISAKMP:(0):Fill atts in sa vpi_length:4
Jul 17 02:48:30.611: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
Jul 17 02:48:30.611: ISAKMP:(0):Returning Actual lifetime: 86400
Jul 17 02:48:30.611: ISAKMP:(0)::Started lifetime timer: 86400.
Jul 17 02:48:30.611: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.611: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
Jul 17 02:48:30.611: ISAKMP (0:0): vendor ID is NAT-T RFC 3947
Jul 17 02:48:30.611: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.611: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 
mismatch
Jul 17 02:48:30.611: ISAKMP (0:0): vendor ID is NAT-T v7
Jul 17 02:48:30.611: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.611: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 
mismatch
Jul 17 02:48:30.611: ISAKMP:(0): vendor ID is NAT-T v3
Jul 17 02:48:30.611: ISAKMP:(0): processing vendor id payload
Jul 17 02:48:30.611: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 
mismatch
Jul 17 02:48:30.611: ISAKMP:(0): vendor ID is NAT-T v2
Jul 17 02:48:30.611: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jul 17 02:48:30.611: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM1
Jul 17 02:48:30.615: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
Jul 17 02:48:30.615: ISAKMP:(0): sending packet to 141.1.123.1 my_port 848 
peer_port 848 (R) MM_SA_SETUP
Jul 17 02:48:30.615: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jul 17 02:48:30.615: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jul 17 02:48:30.615: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM2
Jul 17 02:48:30.859: ISAKMP (0:0): received packet from 141.1.123.1 dport 848 
sport 848 Global (R) MM_SA_SETUP
Jul 17 02:48:30.859: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jul 17 02:48:30.859: ISAKMP:(0):Old State = IKE_R_MM2  New State = IKE_R_MM3
Jul 17 02:48:30.859: ISAKMP:(0): processing KE payload. message ID = 0
Jul 17 02:48:30.903: ISAKMP:(0): processing NONCE payload. message ID = 0
Jul 17 02:48:30.903: ISAKMP:(1005): processing vendor id payload
Jul 17 02:48:30.903: ISAKMP:(1005): vendor ID is Unity
Jul 17 02:48:30.903: ISAKMP:(1005): processing vendor id payload
Jul 17 02:48:30.903: ISAKMP:(1005): vendor ID is DPD
Jul 17 02:48:30.903: ISAKMP:(1005): processing vendor id payload
Jul 17 02:48:30.903: ISAKMP:(1005): vendor ID is COOP
Jul 17 02:48:30.903: ISAKMP:(1005): processing vendor id payload
Jul 17 02:48:30.903: ISAKMP:(1005): speaking to another IOS box!
Jul 17 02:48:30.903: ISAKMP:received payload type 20
Jul 17 02:48:30.903: ISAKMP:received payload type 20
Jul 17 02:48:30.903: ISAKMP:(1005):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_MAIN_MODE
Jul 17 02:48:30.903: ISAKMP:(1005):Old State = IKE_R_MM3  New State = IKE_R_MM3
Jul 17 02:48:30.907: ISAKMP:(1005): sending packet to 141.1.123.1 my_port 848 
peer_port 848 (R) MM_KEY_EXCH
Jul 17 02:48:30.907: ISAKMP:(1005):Sending an IKE IPv4 Packet.
Jul 17 02:48:30.907: ISAKMP:(1005):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_COMPLETE
Jul 17 02:48:30.907: ISAKMP:(1005):Old State = IKE_R_MM3  New State = IKE_R_MM4
Jul 17 02:48:31.991: ISAKMP: set new node 0 to GDOI_IDLE
Jul 17 02:48:31.991: ISAKMP:(1004):Switching to SW IKE SA: sa is 6438CE08, 
ce_id is 80000002
Jul 17 02:48:31.991: ISAKMP:(1004):SA is still budding. Attached new ipsec 
request to it. (local 141.1.123.9, remote 141.1.123.1)
Jul 17 02:48:31.991: ISAKMP: Error while processing SA request: Failed to 
initialize SA
Jul 17 02:48:31.991: ISAKMP: Error while processing KMI message 0, error 2.
Jul 17 02:48:31.991: ISAKMP:(1001):purging SA., sa=6471FCB8, delme=6471FCB8
Jul 17 02:48:40.907: ISAKMP:(1005): retransmitting phase 1 MM_KEY_EXCH...
Jul 17 02:48:40.907: ISAKMP (0:1005): incrementing error counter on sa, attempt 
1 of 5: retransmit phase 1
Jul 17 02:48:40.907: ISAKMP:(1005): retransmitting phase 1 MM_KEY_EXCH
Jul 17 02:48:40.907: ISAKMP:(1005): sending packet to 141.1.123.1 my_port 848 
peer_port 848 (R) MM_KEY_EXCH
Jul 17 02:48:40.907: ISAKMP:(1005):Sending an IKE IPv4 Packet.
Jul 17 02:48:46.991: ISAKMP: quick mode timer expired.
Jul 17 02:48:46.991: ISAKMP:(1004):src 141.1.123.9 dst 141.1.123.1, SA is not 
authenticated
Jul 17 02:48:46.991: ISAKMP:(1004):peer does not do paranoid keepalives.
Jul 17 02:48:46.991: ISAKMP:(1004):deleting SA reason "QM_TIMER expired" state 
(I) MM_KEY_EXCH (peer 141.1.123.1)
Jul 17 02:48:46.991: ISAKMP:(1004):deleting SA reason "QM_TIMER expired" state 
(I) MM_KEY_EXCH (peer 141.1.123.1)
Jul 17 02:48:46.991: ISAKMP: Unlocking peer struct 0x649B6B18 for 
isadb_mark_sa_deleted(), count 0
Jul 17 02:48:46.991: ISAKMP: Deleting peer node by peer_reap for 141.1.123.1: 
649B6B18
Jul 17 02:48:46.991: ISAKMP:(1004):deleting node -1613153694 error FALSE reason 
"IKE deleted"
Jul 17 02:48:46.991: ISAKMP:(1004):deleting node -1221654023 error FALSE reason 
"IKE deleted"
Jul 17 02:48:46.991: ISAKMP:(1004):deleting node 1999376160 error FALSE reason 
"IKE deleted"
Jul 17 02:48:46.991: ISAKMP:(1004):deleting node 136740611 error FALSE reason 
"IKE deleted"
Jul 17 02:48:46.991: ISAKMP:(1004):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
Jul 17 02:48:46.991: ISAKMP:(1004):Old State = IKE_I_MM5  New State = 
IKE_DEST_SA

Jul 17 02:48:50.907: ISAKMP:(1005): retransmitting phase 1 MM_KEY_EXCH...
Jul 17 02:48:50.907: ISAKMP (0:1005): incrementing error counter on sa, attempt 
2 of 5: retransmit phase 1
Jul 17 02:48:50.907: ISAKMP:(1005): retransmitting phase 1 MM_KEY_EXCH
Jul 17 02:48:50.907: ISAKMP:(1005): sending packet to 141.1.123.1 my_port 848 
peer_port 848 (R) MM_KEY_EXCH
Jul 17 02:48:50.907: ISAKMP:(1005):Sending an IKE IPv4 Packet.
Jul 17 02:48:51.991: ISAKMP:(0): no idb in request
Jul 17 02:48:51.991: ISAKMP:(0): SA request profile is (NULL)



_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to