[c-nsp] IPSec between Cisco and D-Link

Dmitriy Sirant lex at init.net.ua
Wed Mar 14 08:50:24 EST 2007


Hello,

Have main office where somebody put D-Link DFL-1600 as main VPN 
concentrator. I try to connect there my cisco 2620.

As i can see, i has worked IKE keys between d-link and cisco, but have 
problem when try ping other side. Found something interesting in debug:

1w1d: IP: s=192.168.132.1 (local), d=10.223.132.254 (FastEthernet1/0), 
len 100, output crypto map check failed.

But i can't found in google what is the problem.

Also i think about that problem sad #send errors 90,

Here some info about ios and config:

ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
ROM: C2600 Software (C2600-IK9O3S3-M), Version 12.3(20), RELEASE 
SOFTWARE (fc2)

cisco-skoda uptime is 1 week, 1 day, 5 hours, 58 minutes
System returned to ROM by power-on
System restarted at 09:37:53 UKR Tue Mar 6 2007
System image file is "flash:c2600-ik9o3s3-mz.123-20.bin"


sh runn (somewhere skipped):
!
ip subnet-zero
ip tcp selective-ack
ip cef
!
crypto isakmp policy 10
  encr aes
  authentication pre-share
  group 2
  lifetime 3600
crypto isakmp key some_key address 212.xx.xx.xx
crypto isakmp keepalive 30 5
!
crypto ipsec transform-set PRN0006 esp-aes esp-sha-hmac
!
crypto map MOJA_MAPA local-address FastEthernet1/0
crypto map MOJA_MAPA 10 ipsec-isakmp
  description Tunnel toPRN0006
  set peer 212.xx.xx.xx
  set transform-set PRN0006
  set pfs group2
  match address KRYPTO_LIST
!
interface FastEthernet0/0
  description Link to LAN
  ip address 192.168.132.1 255.255.255.0
  speed 100
  full-duplex
  fair-queue
!
interface FastEthernet1/0
  description Link to ISP
  ip address 193.xx.xx.xx 255.255.255.224
  speed auto
  half-duplex
  fair-queue
  crypto map MOJA_MAPA
!
ip route 0.0.0.0 0.0.0.0 193.xx.xx.xx
ip route 10.0.0.0 255.0.0.0 FastEthernet1/0
!
ip access-list extended KRYPTO_LIST
  permit ip 192.168.132.0 0.0.0.255 10.0.0.0 0.255.255.255
!


Some info:
cisco#sh crypto ipsec sa

interface: FastEthernet1/0
     Crypto map tag: MOJA_MAPA, local addr. 193.xx.xx.xx

    protected vrf:
    local  ident (addr/mask/prot/port): (192.168.132.0/255.255.255.0/0/0)
    remote ident (addr/mask/prot/port): (10.0.0.0/255.0.0.0/0/0)
    current_peer: 212.xx.xx.xx:500
      PERMIT, flags={origin_is_acl,}
     #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
     #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
     #pkts compressed: 0, #pkts decompressed: 0
     #pkts not compressed: 0, #pkts compr. failed: 0
     #pkts not decompressed: 0, #pkts decompress failed: 0
     #send errors 90, #recv errors 0

      local crypto endpt.: 193.xx.xx.xx, remote crypto endpt.: 212.xx.xx.xx
      path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet1/0
      current outbound spi: 0

      inbound esp sas:

      inbound ah sas:

      inbound pcp sas:

      outbound esp sas:

      outbound ah sas:

      outbound pcp sas:

cisco#ping 10.223.132.254 source 192.168.132.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.223.132.254, timeout is 2 seconds:
Packet sent with a source address of 192.168.132.1
.....
Success rate is 0 percent (0/5)


cisco#sh crypto isakmp sa
dst             src             state          conn-id slot
212.xx.xx.xx   193.xx.xx.xx QM_IDLE              1    0


Please help with that problem.



More information about the cisco-nsp mailing list