<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKEv2 IPsec SA Issues only when we are the Responder in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124327#M1072261</link>
    <description>&lt;P&gt;so your formed a phase 1 but your phase 2 does not coming up.&lt;/P&gt;
&lt;P&gt;could you debug crypto condition peer x.x.x.x and debug crypto ipsec 127 and show us the debugs. also could you please share your configuration too.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jul 2020 15:51:48 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2020-07-23T15:51:48Z</dc:date>
    <item>
      <title>IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124130#M1072254</link>
      <description>&lt;P&gt;So for the past couple of months we've been building an environment in Azure. With trial &amp;amp; error i've experienced that on the Cisco ASA's side, i need to specify the&amp;nbsp;&lt;STRONG&gt;complete&lt;/STRONG&gt; VNet address spaces (we are using 2 address spaces in 1 VNet) in 1 SA (meaning: 1 ACL entry with all our sources and both Azure Address Spaces as destination) to let it work. I'm not really satisfied with this, since this means i'm getting SA's between subnets i dont want.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yesterday i've started experimenting with it. I created a seperate ACL entry for every SA i wanted. Now this is working fine&amp;nbsp;&lt;STRONG&gt;ONLY&lt;/STRONG&gt; when our ASA is the initiator. When the Azure side is initiating, we're not getting any completed SA's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now i've tried debugging where it's failing with the following commands:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;debug crypto condition peer &amp;lt;AZURE_IP&amp;gt;
debug crypto ikev2 protocol 127
debug crypto ipsec 127&lt;/PRE&gt;&lt;P&gt;But i must say i'm not really sure what to look for. I tried looking for what Azure is actually offering in 1 SA, meaning: what subnets/networks are they offering and what are they expecting, but i can't find it. The only reasonable information i see somewhere between all the lines, is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;IKEv2-PROTO-4: (518): Processing IKE_AUTH message&lt;BR /&gt;&lt;STRONG&gt;IKEv2-PROTO-7: (518): Failed to verify the proposed policies&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IKEv2-PROTO-2: (518): There was no IPSEC policy found for received TS&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;I'm not seeing any differences in IKEv2 SA's between responding or initiating. So how could i troubleshoot this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 10:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124130#M1072254</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-07-23T10:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124141#M1072255</link>
      <description>Hi,&lt;BR /&gt;Has one device got PFS (Perfect Forward Secrecy) configured and not the other?</description>
      <pubDate>Thu, 23 Jul 2020 10:49:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124141#M1072255</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-07-23T10:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124147#M1072256</link>
      <description>&lt;P&gt;I had PFS configured on my ASA. I just stripped it off, but still the same issue. When "we" (e.g.: the ASA) initiates everything goes fine. When Azure initiates i'm getting issues.&lt;/P&gt;&lt;P&gt;I've also enabled IKEv2 Platform debugging, and just before the earlier error i'm seeing this:&lt;/P&gt;&lt;PRE&gt;IKEv2-PLAT-4: (498): Crypto Map: No proxy match on map AZURE-LSP-MAP seq 1
IKEv2-PLAT-4: (498): Crypto map AZURE-LSP-MAP seq 2  peer doesn't match map entry&lt;/PRE&gt;&lt;P&gt;It's still weird to me why this would only work one way. Because even though we have 2 different address spaces in our Azure environment, i dont want established SA's between subnets who aren't even supposed to be communicating. Is there any way i can find out exactly WHAT the SA offer is regarding the interesting traffic?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 11:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124147#M1072256</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-07-23T11:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124327#M1072261</link>
      <description>&lt;P&gt;so your formed a phase 1 but your phase 2 does not coming up.&lt;/P&gt;
&lt;P&gt;could you debug crypto condition peer x.x.x.x and debug crypto ipsec 127 and show us the debugs. also could you please share your configuration too.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 15:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124327#M1072261</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-07-23T15:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124409#M1072262</link>
      <description>&lt;P&gt;Hi Sheraz,&lt;/P&gt;&lt;P&gt;Yes, Phase1 forms just fine. Phase 2 only works when "our" side (ASA) initiates the session. I've just found this article, describing the cyphers used by Azure when responding or initiating:&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpn-devices#RouteBasedOffers" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpn-devices#RouteBasedOffers&lt;/A&gt;&lt;/P&gt;&lt;P&gt;On Azure's side, i've just created a IPsec Policy with the following settings:&lt;/P&gt;&lt;PRE&gt;--dh-group DHGroup24 
--ike-encryption AES256 
--ike-integrity SHA384 
--ipsec-encryption AES256 
--ipsec-integrity SHA256 
--pfs-group None 
--sa-lifetime 7200 
--sa-max-size 1024&lt;/PRE&gt;&lt;P&gt;On the ASA's side i've made a new IPsec Transform set and applied it on the crypto map:&lt;/P&gt;&lt;PRE&gt;crypto ipsec ikev2 ipsec-proposal AZU_MITZ
 protocol esp encryption aes-256
 protocol esp integrity sha-256&lt;BR /&gt;&lt;BR /&gt;crypto map AZURE-LSP-MAP 1 match address S2S_AZURE_MITZ&lt;BR /&gt;crypto map AZURE-LSP-MAP 1 set peer AZURE_WAN&lt;BR /&gt;crypto map AZURE-LSP-MAP 1 set ikev2 ipsec-proposal AZU_MITZ&lt;BR /&gt;crypto map AZURE-LSP-MAP 1 set security-association lifetime seconds 7200&lt;BR /&gt;crypto map AZURE-LSP-MAP 1 set security-association lifetime kilobytes unlimited&lt;BR /&gt;&lt;BR /&gt;access-list S2S_AZURE_MITZ line 1 extended permit ip 192.168.252.0 255.255.255.192 10.168.50.0 255.255.255.0 (hitcnt=505) 0x5c44df77&lt;BR /&gt;access-list S2S_AZURE_MITZ line 2 extended permit ip 172.24.0.0 255.255.0.0 10.0.3.0 255.255.255.0 (hitcnt=18) 0x197e40eb&lt;/PRE&gt;&lt;P&gt;I verified that Phase 1 is forming fine, even with the new settings in Azure:&lt;/P&gt;&lt;PRE&gt;IKEv2 SAs:

Session-id:1674, Status:UP-IDLE, IKE count:1, CHILD count:0

Tunnel-id Local                                               Remote                                                  Status         Role
491260539 LOCAL_WAN/500                                     AZURE_WAN/500                                       READY    RESPONDER
      Encr: AES-CBC, keysize: 256, Hash: SHA384, DH Grp:24, Auth sign: PSK, Auth verify: PSK
      Life/Active Time: 86400/13 sec&lt;/PRE&gt;&lt;P&gt;Attached you'll find the output of the debugs after clearing the Phase 1 SA and initiating it from Azure's side.&lt;BR /&gt;And even after all these changes: when i initiate the tunnel everything is working fine. I just hope that having 1 VNet with multiple address spaces doesnt mean i need to have every subnet cross-connect with SA's, cause that's definitely something we're trying to avoid.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 17:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124409#M1072262</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-07-23T17:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124445#M1072265</link>
      <description>&lt;P&gt;I had a good look in your debug and spotted the same issue with you mentioned earlier in your post&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IKEv2-PLAT-4: (60): Crypto Map: No proxy match on map AZURE-LSP-MAP seq 1&lt;BR /&gt;IKEv2-PLAT-4: (60): Crypto map AZURE-LSP-MAP seq 2 peer doesn't match map entry&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;both side not use PSF values. does your remote side have a same access-list&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list S2S_AZURE_MITZ line 1 extended permit ip 192.168.252.0 255.255.255.192 10.168.50.0 255.255.255.0 (hitcnt=505) 0x5c44df77&lt;BR /&gt;access-list S2S_AZURE_MITZ line 2 extended permit ip 172.24.0.0 255.255.0.0 10.0.3.0 255.255.255.0 (hitcnt=18) 0x197e40eb&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if ASA is the initiator your phase 2 come up but when your remote side initiate&amp;nbsp; your tunnel does not come up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you run again some debug in this order&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;capture VPN1 trace isakmp interface outside match ip host a.a.a.a host b.b.b.b
!
capture VPN2 trace isakmp interface outside match ip host b.b.b.b host a.a.a.a
!
debug crypto condition peer b.b.b.b
!
debug crypto ipsec 127
!
debug crypto ikev2 proto 127
!
debug crypto ikev2 platform 127
!
logging buffered debugging
!
logging buffer-size 20565874&lt;BR /&gt;Note: * a.a.a.a is your source outside and b.b.b.b is your remote peer ip address
&lt;/PRE&gt;
&lt;P&gt;I want to see what packet you get when your remote is the initiator.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 18:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124445#M1072265</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-07-23T18:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124506#M1072268</link>
      <description>&lt;PRE&gt;Both side not use PFS values. does your remote side have a same access-list &lt;/PRE&gt;&lt;P&gt;Yes, PFS is not used. It's a VPN Tunnel between a Cisco ASA and Microsoft Azure. Unfortunately, i cannot statically specify a source within Azure. You can only configure the "remote subnets".&lt;/P&gt;&lt;P&gt;How can i securely share the PCAP's with you? I'm not sure if it's safe to drop isakmp PCAP's including WAN IP's straight in this thread.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 19:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124506#M1072268</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-07-23T19:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124523#M1072269</link>
      <description>&lt;P&gt;oh yes. i forget that its a security risk to share this information. I guess if you have a TAC support open a case with cisco or with any other provider.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 20:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124523#M1072269</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-07-23T20:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 IPsec SA Issues only when we are the Responder</title>
      <link>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124572#M1072270</link>
      <description>&lt;P&gt;I can share some details with you:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="A1pxio4" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/79958i57920CC58F115353/image-size/large?v=v2&amp;amp;px=999" role="button" title="A1pxio4" alt="A1pxio4" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Yellow = Azure WAN&lt;BR /&gt;Blue = Cisco WAN&lt;/P&gt;&lt;P&gt;I'm not really sure what i'm looking for, but interesting to me looks packet #9, which has the "Traffic Selector - Initiator" and "Traffic Selector - Responder" headers, looking like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="u1Ijh1J" style="width: 613px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/79960i17798E57C5889CE9/image-size/large?v=v2&amp;amp;px=999" role="button" title="u1Ijh1J" alt="u1Ijh1J" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://i.imgur.com/wSZiT8Z.png" border="0" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So this is the offer coming from Azure WAN, when Phase 2 is not being established.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 21:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev2-ipsec-sa-issues-only-when-we-are-the-responder/m-p/4124572#M1072270</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-07-23T21:04:16Z</dc:date>
    </item>
  </channel>
</rss>

