Routing issue? Can you ping between client and server?
On 11/4/13 12:57 PM, jeremy co wrote:
>   R3----R6  back to back conenction .
>
>
> R3:Client
>
>
> crypto ipsec client ezvpn EASY
>   connect manual
>   group ezvpn_DVTI key cisco123
>   local-address FastEthernet0/0
>   mode client
>   peer 7.7.19.6
>   username cisco password cisco
>   xauth userid mode local
> !
> !
>
> !
> interface Loopback0
>   ip address 7.7.53.3 255.255.255.255
>   crypto ipsec client ezvpn EASY inside
> !
> interface FastEthernet0/0
>   ip address 7.7.19.3 255.255.255.0
>   crypto ipsec client ezvpn EASY outside
>
>
>
> R6:  Server
>
> aaa new-model
> aaa authentication login ikev1-list local
> aaa authorization network ikev1-list local
> aaa session-id common
>
> crypto isakmp policy 1
>   encr 3des
>   hash md5
>   authentication pre-share
>   group 2
>
> crypto isakmp client configuration group ezvpn_DVTI
>   key cisco123
>   domain cisco.com
>   pool pool2
>   save-password
>
> crypto isakmp profile isakmp_profile_dvti
>     match identity group ezvpn_DVTI
>     client authentication list lkey1-list
>     isakmp authorization list lkey1-list
>     client configuration address respond
>     client configuration group ezvpn_DVTI
>     virtual-template 2
>     local-address FastEthernet0/0
>
> crypto ipsec transform-set cisco esp-3des esp-sha-hmac
>
> crypto ipsec profile ikev1
>   set transform-set cisco
>   set isakmp-profile isakmp_profile_dvti
> interface Virtual-Template2 type tunnel
>   ip unnumbered FastEthernet0/0
>   tunnel mode ipsec ipv4
>   tunnel protection ipsec profile ikev1
>
> ip local pool pool2 13.1.1.1 13.1.1.10
>
>
> interface FastEthernet0/0
>   ip address 7.7.19.6 255.255.255.0
>
>
>
> Here is the debug: its not even passing IKE phase 1
> --------------------------------------------------------------------------------------------------------------------------------
>
> R3#  crypto ipsec client ezvpn connect
> R3#
> *Mar  1 00:01:59.583: del_node src 7.7.19.3:500 dst 7.7.19.6:500 fvrf 0x0,
> ivrf 0x0
> *Mar  1 00:01:59.583: ISAKMP:(0):peer does not do paranoid keepalives.
>
> *Mar  1 00:01:59.591: ISAKMP:(0): SA request profile is (NULL)
> *Mar  1 00:01:59.591: ISAKMP: Created a peer struct for 7.7.19.6, peer port
> 500
> *Mar  1 00:01:59.595: ISAKMP: New peer created peer = 0x66BCA8DC
> peer_handle = 0x80000003
> *Mar  1 00:01:59.595: ISAKMP: Locking peer struct 0x66BCA8DC, refcount 1
> for isakmp_initiator
> *Mar  1 00:01:59.595: ISAKMP:(0):Setting client config settings 664962C4
> *Mar  1 00:01:59.595: ISAKMP: local port 500, remote port 500
> *Mar  1 00:01:59.599: ISAKMP: Find a dup sa in the avl tree during calling
> isadb_insert sa = 66651EA4
> *Mar  1 00:01:59.599: ISAKMP:(0): client mode configured.
> *Mar  1 00:01:59.611: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
> *Mar  1 00:01:59.611: ISAKMP:(0): constructed NAT-T vendor-07 ID
> *Mar  1 00:01:59.611: ISAKMP:(0): constructed NAT-T vendor-03 ID
> *Mar  1 00:01:59.615: ISAKMP:(0): constructed NAT-T vendor-02 ID
> *Mar  1 00:01:59.615: ISKAMP: growing send buffer from 1024 to 3072
> *Mar  1 00:01:59.615: ISAKMP:(0):SA is doing pre-shared key authentication
> plus XAUTH using id type ID_KEY_ID
> *Mar  1 00:01:59.619: ISAKMP (0:0): ID payload
>          next-payload : 13
>          type         : 11
>          group id     : ezvpn_DVTI
>          protocol     : 17
>          port         : 0
>          length       : 18
> *Mar  1 00:01:59.619: ISAKMP:(0):Total payload length: 18
> *Mar  1 00:01:59.619: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_AM
> *Mar  1 00:01:59.619: ISAKMP:(0):Old State = IKE_READY  New State =
> IKE_I_AM1
>
> *Mar  1 00:01:59.619: ISAKMP:(0): beginning Aggressive Mode exchange
> *Mar  1 00:01:59.619: ISAKMP:(0): sending packet to 7.7.19.6 my_port 500
> peer_port 500 (I) AG_INIT_EXCH
> *Mar  1 00:01:59.619: ISAKMP:(0):Sending an IKE IPv4 Packet.
> R3#
> R3#
> *Mar  1 00:02:09.619: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH...
> *Mar  1 00:02:09.619: ISAKMP (0:0): incrementing error counter on sa,
> attempt 1 of 5: retransmit phase 1
> *Mar  1 00:02:09.619: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH
> *Mar  1 00:02:09.623: ISAKMP:(0): sending packet to 7.7.19.6 my_port 500
> peer_port 500 (I) AG_INIT_EXCH
> *Mar  1 00:02:09.623: ISAKMP:(0):Sending an IKE IPv4 Packet.
> R3#
> *Mar  1 00:02:19.623: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH...
> *Mar  1 00:02:19.623: ISAKMP (0:0): incrementing error counter on sa,
> attempt 2 of 5: retransmit phase 1
> *Mar  1 00:02:19.623: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH
> *Mar  1 00:02:19.627: ISAKMP:(0): sending packet to 7.7.19.6 my_port 500
> peer_port 500 (I) AG_INIT_EXCH
> *Mar  1 00:02:19.627: ISAKMP:(0):Sending an IKE IPv4 Packet.
> R3#
> *Mar  1 00:02:29.627: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH...
> *Mar  1 00:02:29.627: ISAKMP (0:0): incrementing error counter on sa,
> attempt 3 of 5: retransmit phase 1
> *Mar  1 00:02:29.627: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH
> *Mar  1 00:02:29.631: ISAKMP:(0): sending packet to 7.7.19.6 my_port 500
> peer_port 500 (I) AG_INIT_EXCH
> *Mar  1 00:02:29.631: ISAKMP:(0):Sending an IKE IPv4 Packet.
> R3#
> *Mar  1 00:02:39.631: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH...
> *Mar  1 00:02:39.631: ISAKMP (0:0): incrementing error counter on sa,
> attempt 4 of 5: retransmit phase 1
> *Mar  1 00:02:39.631: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH
> *Mar  1 00:02:39.635: ISAKMP:(0): sending packet to 7.7.19.6 my_port 500
> peer_port 500 (I) AG_INIT_EXCH
> *Mar  1 00:02:39.635: ISAKMP:(0):Sending an IKE IPv4 Packet.
> R3#
> *Mar  1 00:02:49.635: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH...
> *Mar  1 00:02:49.635: ISAKMP (0:0): incrementing error counter on sa,
> attempt 5 of 5: retransmit phase 1
> *Mar  1 00:02:49.635: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH
> *Mar  1 00:02:49.639: ISAKMP:(0): sending packet to 7.7.19.6 my_port 500
> peer_port 500 (I) AG_INIT_EXCH
> *Mar  1 00:02:49.639: ISAKMP:(0):Sending an IKE IPv4 Packet.
> R3#
> *Mar  1 00:02:53.079: ISAKMP:(0):purging SA., sa=66A6DCD4, delme=66A6DCD4
> R3#
> EZVPN(EASY): IPSec connection terminated
> *Mar  1 00:02:59.639: ISAKMP:(0): retransmitting phase 1 AG_INIT_EXCH...
> *Mar  1 00:02:59.639: ISAKMP:(0):peer does not do paranoid keepalives.
>
> *Mar  1 00:02:59.639: ISAKMP:(0):deleting SA reason "Death by
> retransmission P1" state (I) AG_INIT_EXCH (peer 7.7.19.6)
> *Mar  1 00:02:59.647: %CRYPTO-6-EZVPN_CONNECTION_DOWN: (Client)  User=
> Group=ezvpn_DVTI  Client_public_addr=7.7.19.3  Server_public_addr=7.7.19.6
> R3#
> *Mar  1 00:02:59.655: ISAKMP:(0):deleting SA reason "Death by
> retransmission P1" state (I) AG_INIT_EXCH (peer 7.7.19.6)
> *Mar  1 00:02:59.655: ISAKMP: Unlocking peer struct 0x66BCA8DC for
> isadb_mark_sa_deleted(), count 0
> *Mar  1 00:02:59.659: ISAKMP: Deleting peer node by peer_reap for 7.7.19.6:
> 66BCA8DC
> *Mar  1 00:02:59.659: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
> *Mar  1 00:02:59.659: ISAKMP:(0):Old State = IKE_I_AM1  New State =
> IKE_DEST_SA
>
>
> Thanks
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Mon Nov 04 2013 - 18:17:05 ART
This archive was generated by hypermail 2.2.0 : Wed Jan 01 2014 - 20:26:19 ART