<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036869#M1067093</link>
    <description>Ok thanks. Unfortunately i cant get it at this time. If not from qos, could that be problem? Anything particular in debug I should look out for?</description>
    <pubDate>Thu, 27 Feb 2020 13:13:09 GMT</pubDate>
    <dc:creator>CiscoBrownBelt</dc:creator>
    <dc:date>2020-02-27T13:13:09Z</dc:date>
    <item>
      <title>Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036573#M1067045</link>
      <description>&lt;P&gt;Notice that pings to peer addresses for tunnel can be very slow (compared to similar distance tunnels that work) and also will fail every so many !!!! so I am thinking there is possibly a routing problem. Could this also affect the phase 1 Ikev1 negotiation? I don't believe it is making it past the first 1 or 2 messages in Main mode. Here are some errors that stand-out in debug (can't transfer debugs on here as of now): I do get up to at least ATTs are acceptable so I believe policies are good.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Any Help??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CRYPTO-6IKMP_NOT_ENCRYPTED: IKE packet from xxx was not encrypted and&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;it should have been&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Peer does not do paranoid keepalives&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;His hash no match - this node outside NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vendor ID seems Unity/DPD but major 0 mismatch&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;vendor ID is DPD&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 02:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036573#M1067045</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-27T02:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036732#M1067056</link>
      <description>Hi,&lt;BR /&gt;They could just be rate limiting icmp.&lt;BR /&gt;Can you provide the full ikev1/isakmp debugs we can have a look&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 27 Feb 2020 08:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036732#M1067056</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-27T08:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036869#M1067093</link>
      <description>Ok thanks. Unfortunately i cant get it at this time. If not from qos, could that be problem? Anything particular in debug I should look out for?</description>
      <pubDate>Thu, 27 Feb 2020 13:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036869#M1067093</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-27T13:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036877#M1067094</link>
      <description>If there is a connectivity issue, then yes that could cause an issue when establishing a VPN. VPN connectivity does not rely on a ping response, it requires a stable connection.&lt;BR /&gt;&lt;BR /&gt;Slow ping or timeouts do not necessarily indicate an issue that could stop a VPN being established, as mentioned those protocols can be rate limited and therefore be misleading.&lt;BR /&gt;&lt;BR /&gt;If you aren't getting past the MM1/MM2 then that does sound like a comms issue, is there a firewall or ACL in the path? The initial connection is udp/500 to establish IKE SA, then esp and udp/4500 (if nat).&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Feb 2020 13:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4036877#M1067094</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-27T13:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037262#M1067113</link>
      <description>Did a packet capture and verified UDP 500 bidirectional traffic between the peers. No natting done. Do you think perhaps a FW in between the peers (handled by ISP) could still be blocking traffic?&lt;BR /&gt;The keys should be the same and in debugs it show "Att accepted" so I believe policies match. Do you think perhaps keys are actually mismatched?&lt;BR /&gt;I</description>
      <pubDate>Fri, 28 Feb 2020 03:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037262#M1067113</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-28T03:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037351#M1067116</link>
      <description>&lt;P&gt;If there is a firewall in between the peer yes that could be a problem.&amp;nbsp;&lt;BR /&gt;need debug and the configuration from both sides in order to fix the issue.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 08:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037351#M1067116</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-28T08:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037379#M1067118</link>
      <description>&lt;P&gt;UPDATED: If there is bi-directional udp/500 traffic then a firewall is not going to cause an issue stopping the IKE SA being established. Obviously ESP needs to be allowed between the peers for IPSec SA to be established, but you've NOT got that far yet if you can't establish an IKE SA.&lt;BR /&gt;&lt;BR /&gt;If the PSK were mismatched then you'd fail later than MM2.&lt;BR /&gt;Can you provide the configuration and debug so we can spot the error.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 13:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037379#M1067118</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-28T13:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037486#M1067120</link>
      <description>Unfortunately transferring or getting configs and debug on here is not possible aside from me typing it all. It makes it to the policies check and showed "Att accepted" or whatever, the pre-share key validation is after that correct? I confirmed the states go from mm_Exchange then goes to mm_no state so that would point to pre-share key mismatch possibly correct? This is being done on the responder end.</description>
      <pubDate>Fri, 28 Feb 2020 13:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037486#M1067120</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-28T13:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037488#M1067121</link>
      <description>Sorry Im confused with "but you've got that far yet if you can't establish an IKE SA."&lt;BR /&gt;So you mean the PSK check is after all the policies checks (need to get ATT accepted) correct?</description>
      <pubDate>Fri, 28 Feb 2020 13:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037488#M1067121</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-28T13:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037492#M1067122</link>
      <description>&lt;P&gt;Sorry, I missed a crucial word "you've NOT got that far yet".&lt;BR /&gt;&lt;BR /&gt;IKE SA is established over udp/500, which you've proved is bi-directional, so ACL/FW is not blocking that communication. So Phase 1 is failing, you will need to check IKE policies, PSK, crypto ACL etc mirror the peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html" target="_self"&gt;Here&lt;/A&gt; is a useful troubleshooting guide.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 13:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037492#M1067122</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-28T13:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037669#M1067133</link>
      <description>&lt;P&gt;if you are using a cisco router than there are few thing you can do on box in order to pin point where the issue could be. I assume you have access to router cli/ssh.&lt;/P&gt;
&lt;P&gt;1. debug to run&lt;/P&gt;
&lt;P&gt;2. use a monitor capture command to capture the packet. once the packet capture download then to .pcap file. it will show you what and where the communication is breaking down. but debug shall be more useful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 19:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4037669#M1067133</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-28T19:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: Ping drops possible sign why IPSEC tunnel will not complete phase 1?</title>
      <link>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4038316#M1067181</link>
      <description>Yes I can get access. What in particular will I see in the monitor capture as opposed to debug?&lt;BR /&gt;I believe only thing I could see on the router/responder (could have been acting as initiator as I did not see actual key authentication fails or anything if I am supposed to) is I think it gets to "ATT accepted" for the policies but then just keeps re-initiating mm_state or something like that. I have to reference it again. Actual key verification/exchange is after that correct?</description>
      <pubDate>Mon, 02 Mar 2020 03:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-drops-possible-sign-why-ipsec-tunnel-will-not-complete/m-p/4038316#M1067181</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-03-02T03:34:52Z</dc:date>
    </item>
  </channel>
</rss>

