[c-nsp] 6500 with WS-SVC-IPSEC-1, traffic not reaching module.
Lee
ler762 at gmail.com
Tue Dec 15 07:30:11 EST 2009
Do you have the inside and outside vlan for your ipsec traffic configured
with a crypto connect? eg
interface Vlan7
description outside:encrypted traffic
no ip address
crypto engine subslot 8/0
crypto connect vlan8
!
interface Vlan8
description inside:cleartext traffic
ip address xxx
crypto map xxx
crypto engine subslot 8/0
Regards,
Lee
On Tue, Dec 15, 2009 at 6:46 AM, Pär Åslund <pslund at gmail.com> wrote:
> Hi,
>
> I have problems with a WS-SVC-IPSEC-1 where I'm trying to setup a
> site-to-site tunnel.
>
> Last night, I got the tunnel up. But after applying a acl to the 6500,
> the tunnel went down and stayed down. Removing configuration just to
> get the tunnel up again and continue trying to get the interesting
> traffic through as intended, the tunnel never comes up. The remote
> device is a ASA 5505, where I haven't touched anything since this
> failure started. From what I can get out of all this, looking at logs
> and crypto statistics. The traffic never gets to the module in slot 8.
>
> show crypto sessions - nothing
> show crypto isakmp sa - nothing
> show crypto ipsec sa - nothing
>
> I can still use packet-tracer on the asa as I could before and the
> flow is created, but nothing ends up in the 6500 logs. debug crypto
> isakmp and debug crypto ipsec is both enabled without anything being
> logged. Any ideas are most welcome. Guess I have missed something
> obvious but right now I just can't figure out what it is.
>
> This it the configuration from the 6500.
>
> crypto isakmp policy 1
> encr 3des
> authentication pre-share
> group 2
> crypto isakmp key <SECRETKEY> address <peer ip> no-xauth
> !
> crypto isakmp client configuration group GROUP1
> key <KEY>
> dns 172.16.9.2
> domain i.company.com
> pool vpn
> acl 101
> crypto isakmp profile ikepro
> match identity group GROUP1
> client authentication list userlist
> isakmp authorization list grouplist
> client configuration address respond
> client configuration group GROUP1
> crypto isakmp profile site-to-site
> keyring default
> match identity address <peer ip> 255.255.255.255
> keepalive 60 retry 5
> !
> !
> crypto ipsec transform-set 3dessha esp-3des esp-sha-hmac
> !
> crypto ipsec profile ipsecpro
> set transform-set 3dessha
> !
> !
> crypto dynamic-map dynmap 10
> set transform-set 3dessha
> set isakmp-profile ikepro
> crypto dynamic-map dynmap 15
> set peer 76.238.146.205
> set transform-set 3dessha
> set isakmp-profile site-to-site
> crypto dynamic-map dynmap 20
> set transform-set 3dessha
> set isakmp-profile ikepro
> !
> !
> crypto map vpnmap engine slot 8
> crypto map vpnmap 10 ipsec-isakmp dynamic dynmap
>
>
> and then on VLAN 8 where the traffic is suppose to come in:
> interface Vlan8
> ip address <ip> 255.255.255.248
> ip nat outside
> standby 8 ip <standby ip>
> standby 8 priority 115
> standby 8 preempt
> standby 8 name <standby name>
> crypto map vpnmap redundancy <standby name>
> end
>
> Best regards,
> .pelle
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
More information about the cisco-nsp
mailing list