[c-nsp] Site to site vpn Cisco Router to Fortinet

Kenny Kant akennykant at gmail.com
Thu Dec 13 08:28:49 EST 2012


For some reason I don't think it's possible to do VTI to a non Cisco.  I may be wrong here but I think you will have to do crypto maps instead and define traffic on both ends.

Sent from my iPad

On Dec 11, 2012, at 7:37 AM, Joe Freeman <joe at netbyjoe.com> wrote:

> Greetings-
> 
> I am trying to get an ipsec tunnel up between a cisco router and a Fortinet
> 200B for a customer. I've got IKE phase 1 completing, but phase 2 won't
> complete because the router's proposal isn't matching the firewall's-
> 
> 
> 2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: specified selectors
> mismatch
> 2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: peer: type=7/7,
> ports=0/0, protocol=0/0
> 2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408:
> local=0.0.0.0-255.255.255.255, remote=0.0.0.0-255.255.255.255
> 2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: mine: type=7/7,
> ports=0/0, protocol=0/0
> 2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408:
> local=XX.XX.XX.0-XX.XX.XX.255, remote=10.52.132.0-10.52.133.255
> 2012-12-11 09:29:50 ike 1:SJCGW:324472:144706408: specified selectors
> mismatch
> 
> 
> I've been trying to figure out how to set the router to match, but since
> I'm using a tunnel interface in ipsec mode, I haven't seen anything that
> works yet. Here's the router config:
> 
> crypto isakmp policy 1
> encr 3des
> authentication pre-share
> group 2
> lifetime 8600
> !
> crypto isakmp policy 5
> encr aes
> authentication pre-share
> group 2
> lifetime 8600
> !
> crypto isakmp policy 10
> encr aes
> hash sha256
> authentication pre-share
> group 2
> lifetime 8600
> crypto isakmp key XXXXXXXXX address <firewall_ip_addr> no-xauth
> crypto isakmp keepalive 10
> !
> !
> crypto ipsec transform-set CPS_TSET esp-3des esp-sha-hmac
> !
> crypto ipsec profile CPS
> set transform-set CPS_TSET
> 
> interface Tunnel186
> description IPsec interface to Firewall
> ip address <XXXXXXX>
> tunnel source Loopback0
> tunnel mode ipsec ipv4
> tunnel destination <firewall_ip_addr>
> tunnel protection ipsec profile CPS
> 
> I'm thinking I need an ACL and some way to apply it to the crypto profile,
> but I haven't found anything like that for a tunnel interface.
> 
> Any thoughts or suggestions are appreciated!
> 
> Thanks-
> Joe
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/



More information about the cisco-nsp mailing list