[c-nsp] 7600 SPA-IPSEC-2G unable to pass traffic
Dan Benson
dbenson at swingpad.com
Mon Jan 13 14:09:53 EST 2014
List,
I am still trying to pass traffic between two 7600s on the public internet using installed SPA-IPSEC-2G blades without success (running s72033-advipservicesk9_wan-mz.122-33.SXI9)
I have tried, tunnel protect, crypto-connect and vrf type of configurations, none successful.
My deployment has a L3 vlan on the public internet which supports local NAT translations. This interface should be used as the source on each system to communicate with the opposite system. Configs below giving me the following error when I try and pass traffic:
%CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet has invalid spi for
destaddr="localpublic", prot=50, spi=0xB54C2EB1(3041668785), srcaddr= "remotepiblic"
A side: #sho cry isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id slot status
"localpublic" "remotepiblic" QM_IDLE 68032 ACTIVE
A side: #sho cry session
Crypto session current status
Interface: Vlan2
Session status: UP-ACTIVE
Peer: "remotepiblic" port 500
IKE SA: local "localpublic"/500 remote "remotepiblic"/500 Active
IPSEC FLOW: permit ip host "localpublic" host "remotepiblic"/
Active SAs: 0, origin: crypto map
A Side: #sho cry ips sa active
No SAs found
===========
A Side:
crypto engine mode vrf
access-list 101 permit ip host "localpublic" host "remotepiblic"
crypto keyring GIP
pre-shared-key address "remotepiblic" key "key"
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp invalid-spi-recovery
crypto isakmp keepalive 10 3 periodic
crypto isakmp profile GLOBALIP
vrf gip
keyring GIP
match identity address "remotepiblic" 255.255.255.255
!
!
crypto ipsec transform-set GLOBALIP esp-3des esp-sha-hmac
!
crypto map IPSEC local-address Vlan2
crypto map IPSEC 10 ipsec-isakmp
set peer "remotepiblic"
set transform-set GLOBALIP
set pfs group2
set isakmp-profile GLOBALIP
match address 101
interface Vlan2
ip address "localpublic" 255.255.255.240
ip nat outside
ip flow ingress
crypto engine outside
interface Vlan777
ip vrf forwarding gip
ip address 192.168.255.142 255.255.255.252
crypto map IPSEC
crypto engine slot 4/0 inside
==========
B Side:
crypto engine mode vrf
access-list 101 permit ip host "localpublic" host "remotepiblic"
crypto keyring GIP
pre-shared-key address "remotepiblic" key "key"
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp invalid-spi-recovery
crypto isakmp keepalive 10 3 periodic
crypto isakmp profile GLOBALIP
vrf gip
keyring GIP
match identity address "remotepiblic" 255.255.255.255
!
!
crypto ipsec transform-set GLOBALIP esp-3des esp-sha-hmac
!
crypto map IPSEC local-address Vlan2
crypto map IPSEC 10 ipsec-isakmp
set peer "remotepiblic"
set transform-set GLOBALIP
set pfs group2
set isakmp-profile GLOBALIP
match address 101
interface Vlan2
ip address "localpublic" 255.255.255.240
ip nat outside
ip flow ingress
crypto engine outside
interface Vlan777
ip vrf forwarding gip
ip address 192.168.255.141 255.255.255.252
crypto map IPSEC
crypto engine slot 4/0 inside
ANY suggestions here would be a huge help as I am completely stuck at this time.
Thanks!!
db
More information about the cisco-nsp
mailing list