[c-nsp] IPSec problem: invalid transform proposal

Jim McBurnett jim at tgasolutions.com
Mon Feb 13 08:52:28 EST 2006


See if this helps:
http://tinyurl.com/a3z4k

jim 

-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net
[mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of szilard csordas
Sent: Monday, February 13, 2006 7:55 AM
To: cisco-nsp at puck.nether.net
Subject: [c-nsp] IPSec problem: invalid transform proposal

hello,

I want to establish IPSec tunnel between 6500 (122-18.SXD6) with vpnsm
(WS-SVC-IPSEC-1) and pix
(6.3.4)

the configuration seems okay, but the tunnel doesn't come up.

the isakmp is working, but SA is missing.
policy, transform-set, pfs group, key, hash, encapsulation etc. is fine
too.

one of the last line from debug says this:
" invalid transform proposal flags -- 0x2"   Where can I check what this
flag means?


any advice is appreciated
thanx,
szilard csordas


router#sh crypto isakmp sa
dst             src             state          conn-id slot
XXX           XXX         QM_IDLE              1    0


debug output:

....
Feb 13 12:17:29.638 CET: ISAKMP (0:268435457): received packet from XXX
dport 500 sport 500 Global (R) QM_IDLE Feb 13 12:17:29.638 CET: ISAKMP:
set new node 221041643 to QM_IDLE Feb 13 12:17:29.638 CET:
ISAKMP:(0:1:HW:2): processing HASH payload. message ID = 221041643 Feb
13 12:17:29.638 CET: ISAKMP:(0:1:HW:2): processing SA payload. message
ID = 221041643 Feb 13 12:17:29.642 CET: ISAKMP:(0:1:HW:2):Checking IPSec
proposal 1 Feb 13 12:17:29.642 CET: ISAKMP: transform 1, ESP_3DES
Feb 13 12:17:29.642 CET: ISAKMP:   attributes in transform:
Feb 13 12:17:29.642 CET: ISAKMP:      encaps is 1
Feb 13 12:17:29.642 CET: ISAKMP:      SA life type in seconds
Feb 13 12:17:29.642 CET: ISAKMP:      SA life duration (basic) of 28800
Feb 13 12:17:29.642 CET: ISAKMP:      SA life type in kilobytes
Feb 13 12:17:29.642 CET: ISAKMP:      SA life duration (VPI) of  0x0
0x46
0x50 0x0
Feb 13 12:17:29.642 CET: ISAKMP:      authenticator is HMAC-SHA
Feb 13 12:17:29.642 CET: ISAKMP:(0:1:HW:2):atts are acceptable.
Feb 13 12:17:29.642 CET: IPSEC(validate_proposal_request): proposal part
#1,
  (key eng. msg.) INBOUND local= XXX, remote= XXX,
    local_proxy= XXX/255.255.255.128/0/0 (type=4),
    remote_proxy= XXX/255.255.255.240/0/0 (type=4),
    protocol= ESP, transform= esp-3des esp-sha-hmac ,
    lifedur= 0s and 0kb,
    spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x2 Feb 13 12:17:29.642
CET: IPSEC(kei_proxy): head = MAPNAME, map-*>ivrf = ,
kei->ivrf = *
Feb 13 12:17:29.642 CET: IPSEC(validate_transform_proposal): invalid
transform proposal flags -- 0x2 Feb 13 12:17:29.642 CET:
ISAKMP:(0:1:HW:2): IPSec policy invalidated proposal Feb 13 12:17:29.642
CET: ISAKMP:(0:1:HW:2): phase 2 SA policy not acceptable! (local XXX
remote XXX) _______________________________________________
cisco-nsp mailing list  cisco-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



More information about the cisco-nsp mailing list