<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Establishing Direct IPSEC v6 tunnel between Cisco CSR and NSX-EP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/establishing-direct-ipsec-v6-tunnel-between-cisco-csr-and-nsx-ep/m-p/4535509#M1086636</link>
    <description>&lt;P&gt;I'm trying to establish IPv6 in IPv6 direct tunnels between Cisco CSR router and NSX-EP. I see phase1 negotiation succeeds but phase2 negotiation fails with following error:&lt;BR /&gt;&lt;BR /&gt;Jan 20 20:24:51.512: IKEv2:(SESSION ID = 28799,SA ID = 2):IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:(SESSION ID = 28799,SA ID = 2):Session with IKE ID PAIR (FD00:1:1:1::2, FD00:BBBB:1:11::1) is UP&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:IKEv2 MIB tunnel started, tunnel index 2&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:(SESSION ID = 28799,SA ID = 2):Load IPSEC key material&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:(SA ID = 2):[IKEv2 -&amp;gt; IPsec] Create IPsec SA into IPsec database&lt;BR /&gt;*Jan 20 20:24:51.512: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC:(SESSION ID = 28799) (crypto_ipsec_create_ipsec_sas) Map found Tunnel11-head-0, 65537&lt;BR /&gt;*Jan 20 20:24:51.513: crypto_engine: Generate IKEv2 keying&lt;BR /&gt;*Jan 20 20:24:51.513: crypto_engine_ipsec_key_create_by_keys: Error: unsupported capability IPv6 and UDP-encaps&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC:(SESSION ID = 28799) (get_old_outbound_sa_for_peer) No outbound SA found for peer 7FA9A9926BB8&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC:(SESSION ID = 28799) (update_current_outbound_sa) updated peer FD00:1:1:1::2 current outbound sa to SPI 0&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC(send_delete_notify_kmi): ASSERT FAILED: Decrement count mismatch for sibling :7FA9A98F5778&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC(send_delete_notify_kmi): not sending KEY_ENGINE_DELETE_SAS&lt;BR /&gt;*Jan 20 20:24:51.513: crypto engine: deleting IPSec SA ???&lt;BR /&gt;*Jan 20 20:24:51.513: delete_ipsec_sa: no such crypto engine&lt;BR /&gt;*Jan 20 20:24:51.513: crypto engine: deleting IPSec SA ???&lt;BR /&gt;*Jan 20 20:24:51.513: delete_ipsec_sa: no such crypto engine&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC(ident_send_delete_notify_kmi): not in msg context Ident Delete SA msg: 0&lt;BR /&gt;*Jan 20 20:24:51.513: IKEv2:(SA ID = 2):[IPsec -&amp;gt; IKEv2] Creation of IPsec SA into IPsec database FAILED&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):: Creation/Installation of IPsec SA into IPsec DB failed&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):Queuing IKE SA delete request reason: unknown&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):Sending DELETE INFO message for IPsec SA [SPI: 0xDE324A31]&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):Building packet for encryption.&lt;BR /&gt;Payload contents:&lt;BR /&gt;&lt;BR /&gt;Can someone throw some light into it.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jan 2022 04:11:14 GMT</pubDate>
    <dc:creator>somj.shukla</dc:creator>
    <dc:date>2022-01-21T04:11:14Z</dc:date>
    <item>
      <title>Establishing Direct IPSEC v6 tunnel between Cisco CSR and NSX-EP</title>
      <link>https://community.cisco.com/t5/network-security/establishing-direct-ipsec-v6-tunnel-between-cisco-csr-and-nsx-ep/m-p/4535509#M1086636</link>
      <description>&lt;P&gt;I'm trying to establish IPv6 in IPv6 direct tunnels between Cisco CSR router and NSX-EP. I see phase1 negotiation succeeds but phase2 negotiation fails with following error:&lt;BR /&gt;&lt;BR /&gt;Jan 20 20:24:51.512: IKEv2:(SESSION ID = 28799,SA ID = 2):IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:(SESSION ID = 28799,SA ID = 2):Session with IKE ID PAIR (FD00:1:1:1::2, FD00:BBBB:1:11::1) is UP&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:IKEv2 MIB tunnel started, tunnel index 2&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:(SESSION ID = 28799,SA ID = 2):Load IPSEC key material&lt;BR /&gt;*Jan 20 20:24:51.512: IKEv2:(SA ID = 2):[IKEv2 -&amp;gt; IPsec] Create IPsec SA into IPsec database&lt;BR /&gt;*Jan 20 20:24:51.512: IPSEC(key_engine): got a queue event with 1 KMI message(s)&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC:(SESSION ID = 28799) (crypto_ipsec_create_ipsec_sas) Map found Tunnel11-head-0, 65537&lt;BR /&gt;*Jan 20 20:24:51.513: crypto_engine: Generate IKEv2 keying&lt;BR /&gt;*Jan 20 20:24:51.513: crypto_engine_ipsec_key_create_by_keys: Error: unsupported capability IPv6 and UDP-encaps&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC:(SESSION ID = 28799) (get_old_outbound_sa_for_peer) No outbound SA found for peer 7FA9A9926BB8&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC:(SESSION ID = 28799) (update_current_outbound_sa) updated peer FD00:1:1:1::2 current outbound sa to SPI 0&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC(send_delete_notify_kmi): ASSERT FAILED: Decrement count mismatch for sibling :7FA9A98F5778&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC(send_delete_notify_kmi): not sending KEY_ENGINE_DELETE_SAS&lt;BR /&gt;*Jan 20 20:24:51.513: crypto engine: deleting IPSec SA ???&lt;BR /&gt;*Jan 20 20:24:51.513: delete_ipsec_sa: no such crypto engine&lt;BR /&gt;*Jan 20 20:24:51.513: crypto engine: deleting IPSec SA ???&lt;BR /&gt;*Jan 20 20:24:51.513: delete_ipsec_sa: no such crypto engine&lt;BR /&gt;*Jan 20 20:24:51.513: IPSEC(ident_send_delete_notify_kmi): not in msg context Ident Delete SA msg: 0&lt;BR /&gt;*Jan 20 20:24:51.513: IKEv2:(SA ID = 2):[IPsec -&amp;gt; IKEv2] Creation of IPsec SA into IPsec database FAILED&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):: Creation/Installation of IPsec SA into IPsec DB failed&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):Queuing IKE SA delete request reason: unknown&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):Sending DELETE INFO message for IPsec SA [SPI: 0xDE324A31]&lt;BR /&gt;*Jan 20 20:24:51.515: IKEv2:(SESSION ID = 28799,SA ID = 2):Building packet for encryption.&lt;BR /&gt;Payload contents:&lt;BR /&gt;&lt;BR /&gt;Can someone throw some light into it.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 04:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/establishing-direct-ipsec-v6-tunnel-between-cisco-csr-and-nsx-ep/m-p/4535509#M1086636</guid>
      <dc:creator>somj.shukla</dc:creator>
      <dc:date>2022-01-21T04:11:14Z</dc:date>
    </item>
  </channel>
</rss>

