[c-nsp] Site to site vpn Cisco Router to Fortinet

Joe Freeman joe at netbyjoe.com
Tue Dec 11 08:37:07 EST 2012


Greetings-

I am trying to get an ipsec tunnel up between a cisco router and a Fortinet
200B for a customer. I've got IKE phase 1 completing, but phase 2 won't
complete because the router's proposal isn't matching the firewall's-


2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: specified selectors
mismatch
2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: peer: type=7/7,
ports=0/0, protocol=0/0
2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408:
local=0.0.0.0-255.255.255.255, remote=0.0.0.0-255.255.255.255
2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: mine: type=7/7,
ports=0/0, protocol=0/0
2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408:
local=XX.XX.XX.0-XX.XX.XX.255, remote=10.52.132.0-10.52.133.255
2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: specified selectors
mismatch


I've been trying to figure out how to set the router to match, but since
I'm using a tunnel interface in ipsec mode, I haven't seen anything that
works yet. Here's the router config:

crypto isakmp policy 1
 encr 3des
 authentication pre-share
 group 2
 lifetime 8600
!
crypto isakmp policy 5
 encr aes
 authentication pre-share
 group 2
 lifetime 8600
!
crypto isakmp policy 10
 encr aes
 hash sha256
 authentication pre-share
 group 2
 lifetime 8600
crypto isakmp key XXXXXXXXX address <firewall_ip_addr> no-xauth
crypto isakmp keepalive 10
!
!
crypto ipsec transform-set CPS_TSET esp-3des esp-sha-hmac
!
crypto ipsec profile CPS
 set transform-set CPS_TSET

interface Tunnel186
 description IPsec interface to Firewall
 ip address <XXXXXXX>
 tunnel source Loopback0
 tunnel mode ipsec ipv4
 tunnel destination <firewall_ip_addr>
 tunnel protection ipsec profile CPS

I'm thinking I need an ACL and some way to apply it to the crypto profile,
but I haven't found anything like that for a tunnel interface.

Any thoughts or suggestions are appreciated!

Thanks-
Joe


More information about the cisco-nsp mailing list