[c-nsp] IPSec between Cisco and D-Link
twisted mac
twist3dmac at gmail.com
Fri Dec 12 07:55:07 EST 2008
Seems fair enough :)
logs from dlink
2008-12-11 17:30:21: IkeSnoop: Received IKE packet from
82.x.x.x:500 Exchange
type : Informational ISAKMP Version : 1.0 Flags : E (encryption) Cookies :
0x458f51017c4a446 -> 0xa582286a38ab6fb0 Message ID : 0x2f8ad085 Packet
length : 452 bytes # payloads : 2 Payloads: HASH (Hash) Payload data length
: 20 bytes N (Notification) Payload data length : 396 bytes Protocol ID :
ESP Notification : No proposal chosen
logs from cisco:
xxx#debug crypto isakmp
Crypto ISAKMP debugging is on
xxx#
2d23h: ISAKMP (0:134217749): received packet from 217.x.x.x dport 500 sport
500 Global (R) QM_IDLE
2d23h: ISAKMP: set new node -1473959992 to QM_IDLE
2d23h: ISAKMP:(0:21:SW:1): processing HASH payload. message ID = -1473959992
2d23h: ISAKMP:(0:21:SW:1): processing SA payload. message ID = -1473959992
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: transform 1, ESP_AES
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: key length is 128
2d23h: ISAKMP: authenticator is HMAC-MD5
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: transform 2, ESP_AES
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: key length is 128
2d23h: ISAKMP: authenticator is HMAC-SHA
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: transform 3, ESP_3DES
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: authenticator is HMAC-MD5
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: transform 4, ESP_3DES
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: authenticator is HMAC-SHA
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: unknown ESP transform!
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: authenticator is HMAC-MD5
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: unknown ESP transform!
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: authenticator is HMAC-SHA
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: unknown ESP transform!
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: key length is 128
2d23h: ISAKMP: authenticator is HMAC-MD5
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: unknown ESP transform!
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: key length is 128
2d23h: ISAKMP: authenticator is HMAC-SHA
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: unknown ESP transform!
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: key length is 128
2d23h: ISAKMP: authenticator is HMAC-MD5
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1):Checking IPSec proposal 1
2d23h: ISAKMP: unknown ESP transform!
2d23h: ISAKMP: attributes in transform:
2d23h: ISAKMP: key length is 128
2d23h: ISAKMP: authenticator is HMAC-SHA
2d23h: ISAKMP: SA life type in seconds
2d23h: ISAKMP: SA life duration (basic) of 3600
2d23h: ISAKMP: encaps is 1 (Tunnel)
2d23h: ISAKMP:(0:21:SW:1):atts are acceptable.
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): IPSec policy invalidated proposal
2d23h: ISAKMP:(0:21:SW:1): phase 2 SA policy not acceptable! (local 82.x.x.x
remote 217.x.x.x)
2d23h: ISAKMP: set new node 326922217 to QM_IDLE
2d23h: ISAKMP:(0:21:SW:1):Sending NOTIFY PROPOSAL_NOT_CHOSEN protocol 3
spi 1691668640, message ID = 326922217
2d23h: ISAKMP:(0:21:SW:1): sending packet to 217.x.x.x my_port 500 peer_port
500 (R) QM_IDLE
2d23h: ISAKMP:(0:21:SW:1):purging node 326922217
2d23h: ISAKMP:(0:21:SW:1):deleting node -1473959992 error TRUE reason "QM
rejected"
2d23h: ISAKMP (0:134217749): Unknown Input IKE_MESG_FROM_PEER, IKE_QM_EXCH:
for node -1473959992: state = IKE_QM_READY
2d23h: ISAKMP:(0:21:SW:1):Node -1473959992, Input = IKE_MESG_FROM_PEER,
IKE_QM_EXCH
2d23h: ISAKMP:(0:21:SW:1):Old State = IKE_QM_READY New State = IKE_QM_READY
2d23h: ISAKMP:(0:22:SW:1):purging node 124919870
cisco config
crypto isakmp policy 1
encr aes
hash md5
authentication pre-share
group 2
lifetime 28800
crypto isakmp key 123456 address 217.x.x.x no-xauth
crypto isakmp key 123456 address 85.x.x.x no-xauth
crypto isakmp aggressive-mode disable
!
!
crypto ipsec transform-set VPN esp-aes
!
crypto map xxx 10 ipsec-isakmp
set peer 217.x.x.x
set transform-set VPN
match address 111
crypto map eon 20 ipsec-isakmp
set peer 85.x.x.x
set transform-set VPN-EON
match address 112
!
----//----
xxx#sh crypto map tag xxx
Crypto Map "xxx" 10 ipsec-isakmp
Peer = 217.x.x.x
Extended IP access list 111
access-list 111 permit ip 192.168.200.0 0.0.0.255 192.168.0.0
0.0.0.255
Current peer: 217.x.x.x
Security association lifetime: 4608000 kilobytes/3600 seconds
PFS (Y/N): N
Transform sets={
VPN,
}
Crypto Map "xxx" 20 ipsec-isakmp
Peer = 85.x.x.x
Extended IP access list 112
access-list 112 permit ip 192.168.200.0 0.0.0.255 192.168.96.0
0.0.7.255
Current peer: 85.x.x.x
Security association lifetime: 4608000 kilobytes/3600 seconds
PFS (Y/N): N
Transform sets={
VPN,
}
Interfaces using crypto map xxx:
FastEthernet0/1
---//---
the dlink is a dfl-1600
any ideas? hammer is not possible because the dlink box is on the other side
of the ocean :)
mac
2008/12/12 Mario Spinthiras <spinthiras.mario at gmail.com>
> How about the actual problem so we can help there? Logs , errors?
>
More information about the cisco-nsp
mailing list