From: Richard Geiger (geiger_rich@xxxxxxxxxxx)
Date: Tue Jan 08 2002 - 05:49:03 GMT-3
   
look at :
>Jan  7 12:18:28: CryptoEngine0: generate hmac context for conn id 2 Jan  7
>12:18:28: ISAKMP (2): sending packet to 172.16.99.2 (R) QM_IDLE Jan  7
>12:18:28: ISAKMP (0:2): purging node 441531424 Jan  7 12:19:10: ISAKMP
>(0:2): peer does not do paranoid keepalives.
>
>Jan  7 12:19:10: ISAKMP (0:2): deleting SA reason "IKE SA Lifetime
>Exceeded" state (R) QM_IDLE       (peer 172.16.99.2) input queue 0 Jan  7
>12:19:10: CryptoEngine0: generate hmac context for conn id 2 Jan  7
>12:19:10: ISAKMP (2): sending packet to 172.16.99.2 (R)
MM_NO_STATE
>Jan  7 12:19:10: ISAKMP (0:2): purging node -159029524 Jan  7 12:20:10:
>ISAKMP (0:2): purging SA. Jan  7 12:20:10: CryptoEngine0: delete connection
>2
It looks like the tunnel is being destroyed because of your defined sa
lifetime, but the packets for renegotiation are being set to the tunnel
interface instead of the procy interface.
I agree you should look at PFS, and review the time-out settings there might
be something in there....-rich
>From: "tom cheung" <tkc9789@hotmail.com>
>Reply-To: "tom cheung" <tkc9789@hotmail.com>
>To: jonc@pacbell.net, studyccie@hotmail.com, ccielab@groupstudy.com
>Subject: RE: IPSEC - Tunnel Endpoint Discovery
>Date: Mon, 07 Jan 2002 17:46:35 -0600
>
>Jon,
>I also noticed that during IPSEC tunnel negotiation, R4 is requesting new
>SA.  So did you define PFS on R4?  If so, try either taking it out or turn
>on PFS on R5 as well.
>
>Tom
>
>>From: Jon Carmichael <jonc@pacbell.net>
>>To: tom cheung <tkc9789@hotmail.com>, studyccie@hotmail.com,
>>ccielab@groupstudy.com
>>Subject: RE: IPSEC - Tunnel Endpoint Discovery
>>Date: Mon, 07 Jan 2002 15:18:50 -0800
>>
>>I appreciate your close look at the debugs to determine what's
>>missing, --but what I can't figure out is what's missing in the config to
>>make it work.  I can't find anything.
>>
>>JONC
>>
>>
>>-----Original Message-----
>>From: tom cheung [mailto:tkc9789@hotmail.com]
>>Sent: Monday, January 07, 2002 2:06 PM
>>To: jonc@pacbell.net; studyccie@hotmail.com; ccielab@groupstudy.com
>>Subject: Re: IPSEC - Tunnel Endpoint Discovery
>>
>>
>>Jon,
>>Although I'm no expert in VPN, but I don't see any tunnel discovery
>>request
>>message in your debug. One requirement for TED to work is that both peers
>>will have to be TED enabled.  Wonder if this requirement is met?
>>
>>Tom
>>
>>
>> >From: Jon Carmichael <jonc@pacbell.net>
>> >Reply-To: Jon Carmichael <jonc@pacbell.net>
>> >To: CCIE Study <studyccie@hotmail.com>, ccielab@groupstudy.com
>> >Subject: IPSEC - Tunnel Endpoint Discovery
>> >Date: Mon, 07 Jan 2002 12:30:29 -0800
>> >
>> >I've been trying to get Tunnel Endpoint Discover working since
>>yesterday.
>> >I've been thru several iterations.  I'm following variations of the
>> >following two examples on CCO.
>> >
>> >http://www.cisco.com/warp/public/707/tedpreshare.html
>> >
>> >and
>> >
>> >http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/12
>>0
>> >t/120t5/ted.htm
>> >
>> >I'm not getting the same result from my debugs that they show in both
>> >examples, I will paste one of my debugs and one of my configs.   If
>>anyone
>> >can interpret this debug or config to tell me why it's failing I would
>>sure
>> >appreciate.
>> >
>> >JONC
>> >
>> >
>> >JCLab5d-R5#
>> >JCLab5d-R5#
>> >JCLab5d-R5#sho run | begin crypto
>> >crypto isakmp policy 10
>> >  authentication pre-share
>> >  lifetime 180
>> >crypto isakmp key R4R5-key address 0.0.0.0
>> >!
>> >!
>> >crypto ipsec transform-set ENC ah-sha-hmac esp-des esp-md5-hmac
>> >!
>> >crypto dynamic-map TED-DMAP 10
>> >  set transform-set ENC
>> >  match address 111
>> >!
>> >!
>> >crypto map TEDTAG 10 ipsec-isakmp dynamic TED-DMAP discover
>> >!
>> >!
>> >JCLab5d-R5#
>> >JCLab5d-R5#sho access-list 111
>> >Extended IP access list 111
>> >     permit tcp 192.168.20.0 0.0.0.255 10.14.0.0 0.0.0.255 (814 matches)
>> >     permit ip 192.168.20.0 0.0.0.255 10.14.0.0 0.0.0.255 (12 matches)
>> >JCLab5d-R5#
>> >JCLab5d-R5#
>> >JCLab5d-R5#sho log
>> >Syslog logging: enabled (0 messages dropped, 0 flushes, 0 overruns)
>> >     Console logging: disabled
>> >     Monitor logging: level debugging, 0 messages logged
>> >     Buffer logging: level debugging, 1953 messages logged
>> >     Trap logging: level informational, 66 message lines logged
>> >
>> >Log Buffer (4096 bytes):
>> >
>> >     lifedur= 3600s and 4608000kb,
>> >     spi= 0x15AD0C8C(363662476), conn_id= 2006, keysize= 0, flags= 0x4
>> >Jan  7 12:16:24: IPSEC(initialize_sas): ,
>> >   (key eng. msg.) src= 172.16.99.1, dest= 172.16.99.2,
>> >     src_proxy= 192.168.20.0/255.255.255.0/0/0 (type=4),
>> >     dest_proxy= 10.14.0.0/255.255.255.0/6/0 (type=4),
>> >     protocol= ESP, transform= esp-des esp-md5-hmac ,
>> >     lifedur= 3600s and 4608000kb,
>> >     spi= 0x156F07B7(359598007), conn_id= 2007, keysize= 0, flags= 0x4
>> >Jan  7 12:16:24: IPSEC(create_sa): sa created,
>> >   (sa) sa_dest= 172.16.99.1, sa_prot= 51,
>> >     sa_spi= 0x21630610(560137744),
>> >     sa_trans= ah-sha-hmac , sa_conn_id= 2004
>> >Jan  7 12:16:24: IPSEC(create_sa): sa created,
>> >   (sa) sa_dest= 172.16.99.2, sa_prot= 51,
>> >     sa_spi= 0xD4C2288(223093384),
>> >     sa_trans= ah-sha-hmac , sa_conn_id= 2005
>> >Jan  7 12:16:24: IPSEC(create_sa): sa created,
>> >   (sa) sa_dest= 172.16.99.1, sa_prot= 50,
>> >     sa_spi= 0x15AD0C8C(363662476),
>> >     sa_trans= esp-des esp-md5-hmac , sa_conn_id= 2006
>> >Jan  7 12:16:24: IPSEC(create_sa): sa created,
>> >   (sa) sa_dest= 172.16.99.2, sa_prot= 50,
>> >     sa_spi= 0x156F07B7(359598007),
>> >     sa_trans= esp-des esp-md5-hmac , sa_conn_id= 2007
>> >Jan  7 12:16:24: IPSEC(add_sa): peer asks for new SAs -- expire current
>>in
>> >120 sec.,
>> >   (sa) sa_dest= 172.16.99.2, sa_prot= 50,
>> >     sa_spi= 0xCEB0AB0(216730288),
>> >     sa_trans= esp-des esp-md5-hmac , sa_conn_id= 2003,
>> >   (identity) local= 172.16.99.1, remote= 172.16.99.2,
>> >     local_proxy= 192.168.20.0/255.255.255.0/0/0 (type=4),
>> >     remote_proxy= 10.14.0.0/255.255.255.0/6/0 (type=4)
>> >Jan  7 12:16:40: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:17:13: ISAKMP (0:2): purging node -1847150921
>> >Jan  7 12:18:28: IPSEC(sa_aging): lifetime expiring,
>> >   (sa) sa_dest= 172.16.99.1, sa_prot= 51,
>> >     sa_spi= 0x21C90079(566820985),
>> >     sa_trans= ah-sha-hmac , sa_conn_id= 2000,
>> >   (identity) local= 172.16.99.1, remote= 172.16.99.2,
>> >     local_proxy= 192.168.20.0/255.255.255.0/0/0 (type=4),
>> >     remote_proxy= 10.14.0.0/255.255.255.0/6/0 (type=4)
>> >Jan  7 12:18:28: IPSEC(delete_sa): deleting SA,
>> >   (sa) sa_dest= 172.16.99.1, sa_prot= 51,
>> >     sa_spi= 0x21C90079(566820985),
>> >     sa_trans= ah-sha-hmac , sa_conn_id= 2000
>> >Jan  7 12:18:28: IPSEC(delete_sa): deleting SA,
>> >   (sa) sa_dest= 172.16.99.2, sa_prot= 51,
>> >     sa_spi= 0x26C600E2(650510562),
>> >     sa_trans= ah-sha-hmac , sa_conn_id= 2001
>> >Jan  7 12:18:28: IPSEC(delete_sa): deleting SA,
>> >   (sa) sa_dest= 172.16.99.1, sa_prot= 50,
>> >     sa_spi= 0x99319EC(160635372),
>> >     sa_trans= esp-des esp-md5-hmac , sa_conn_id= 2002
>> >Jan  7 12:18:28: IPSEC(delete_sa): deleting SA,
>> >   (sa) sa_dest= 172.16.99.2, sa_prot= 50,
>> >     sa_spi= 0xCEB0AB0(216730288),
>> >     sa_trans= esp-des esp-md5-hmac , sa_conn_id= 2003
>> >Jan  7 12:18:28: ISAKMP: received ke message (3/2)
>> >Jan  7 12:18:28: CryptoEngine0: generate hmac context for conn id 2
>> >Jan  7 12:18:28: ISAKMP (2): sending packet to 172.16.99.2 (R) QM_IDLE
>> >Jan  7 12:18:28: ISAKMP (0:2): purging node 441531424
>> >Jan  7 12:19:10: ISAKMP (0:2): peer does not do paranoid keepalives.
>> >
>> >Jan  7 12:19:10: ISAKMP (0:2): deleting SA reason "IKE SA Lifetime
>> >Exceeded"
>> >state (R) QM_IDLE       (peer 172.16.99.2) input queue 0
>> >Jan  7 12:19:10: CryptoEngine0: generate hmac context for conn id 2
>> >Jan  7 12:19:10: ISAKMP (2): sending packet to 172.16.99.2 (R)
>>MM_NO_STATE
>> >Jan  7 12:19:10: ISAKMP (0:2): purging node -159029524
>> >Jan  7 12:20:10: ISAKMP (0:2): purging SA.
>> >Jan  7 12:20:10: CryptoEngine0: delete connection 2
>> >Jan  7 12:21:15: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:21:17: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:21:21: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:21:29: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:25:12: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:26:46: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:26:48: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:26:52: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >Jan  7 12:27:00: IPSEC(sa_initiate): ACL = deny; sa request ignored
>> >JCLab5d-R5#
>> >JCLab5d-R5#
This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:56:20 GMT-3