<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 'crypto keyring' limit for VRF on IOS router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548508#M1087214</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326072"&gt;@johnlloyd_13&lt;/a&gt; you can certainly match against more than one vrf.&lt;/P&gt;
&lt;P&gt;What is the configuration of the physical interfaces?&lt;/P&gt;
&lt;P&gt;I assume you've double checked the ISAKMP Policy matches the algorithms on both ends?&lt;/P&gt;</description>
    <pubDate>Wed, 09 Feb 2022 12:05:22 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-02-09T12:05:22Z</dc:date>
    <item>
      <title>'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548479#M1087211</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i got a 2911 router which currently has a site-to-site VPN working using the 'crypto keyring vrf' (for VRF aware IPSEC).&lt;/P&gt;&lt;P&gt;i need to add another site (CUST-2) using the same command but different VRF (CUST-2) but getting the log and deug below. i already made sure the remote config is fine and re-applied the PSK on both ends but still no SA.&lt;/P&gt;&lt;P&gt;my question is, is there a limit on the number of VRF allowed locally on an IOS router (2911 in this case) to use the 'crypto keyring vrf' command? is it limited to just one VRF?&lt;/P&gt;&lt;P&gt;i tried using the 'native' or global RT for 'crypto isakmp key' and the 'crypto isakmp profile' but still no SA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto keyring CUST-1 vrf CUST-1&lt;BR /&gt;&amp;nbsp;pre-shared-key address 20.x.x.4 key &amp;lt;KEY-1&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;crypto keyring CUST-2 vrf CUST-2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;pre-shared-key address 202.x.x.41 key &amp;lt;KEY-2&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto map CMAP 10 ipsec-isakmp&lt;BR /&gt;set peer 20.x.x.4&lt;BR /&gt;set transform-set TSET-AES-SHA&lt;BR /&gt;match address &amp;lt;ACL-1&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;crypto map CMAP 20 ipsec-isakmp &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;set peer 202.x.x.41&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;set transform-set TSET-AES-SHA &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;match address &amp;lt;ACL-2&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;.Feb 9 11:07:49.692 UTC: %CRYPTO-6-IKMP_NO_PRESHARED_KEY: Pre-shared key for remote peer at 202.x.x.41 is missing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;.Feb 9 10:32:12.470 UTC: ISAKMP:(0):No pre-shared key with 202.x.x.41!&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: %CRYPTO-6-IKMP_NO_PRESHARED_KEY: Pre-shared key for remote peer at 202.x.x.41 is missing&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP : Scanning profiles for xauth ...&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP:(0):Checking ISAKMP transform 1 against priority 10 policy&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP: default group 2&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP: encryption AES-CBC&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP: keylength of 128&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP: hash SHA&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP: auth pre-share&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP: life type in seconds&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP: life duration (VPI) of 0x0 0x0 0xA8 0xC0&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;.Feb 9 10:32:12.470 UTC: ISAKMP:(0):Preshared authentication offered but does not match policy!&lt;/FONT&gt;&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP:(0):atts are not acceptable. Next payload is 0&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP:(0):no offers accepted!&lt;BR /&gt;.Feb 9 10:32:12.470 UTC: ISAKMP:(0): phase 1 SA policy not acceptable! (local 61.x.x162 remote 202.x.x.41)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 11:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548479#M1087211</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-02-09T11:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548484#M1087212</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326072"&gt;@johnlloyd_13&lt;/a&gt; do you have an ISAKMP profile for this new VPN, with the specific vrf defined?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 11:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548484#M1087212</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-09T11:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548502#M1087213</link>
      <description>&lt;P&gt;hi rob,&lt;/P&gt;&lt;P&gt;as mentioned, i tried that approach but no SA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto isakmp profile &amp;lt;CUST-2&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vrf &amp;lt;CUST-2&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;keyring&amp;lt;CUST-2&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;match identity address 202.x.x.41 255.255.255.255 &amp;lt;CUST-2&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;crypto map CMAP 20 ipsec-isakmp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;set isakmp-profile &amp;lt;CUST-2&amp;gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 11:52:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548502#M1087213</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-02-09T11:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548508#M1087214</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326072"&gt;@johnlloyd_13&lt;/a&gt; you can certainly match against more than one vrf.&lt;/P&gt;
&lt;P&gt;What is the configuration of the physical interfaces?&lt;/P&gt;
&lt;P&gt;I assume you've double checked the ISAKMP Policy matches the algorithms on both ends?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 12:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548508#M1087214</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-09T12:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548509#M1087215</link>
      <description>&lt;P&gt;Sorry, can you just clear this, are you use one interface for crypto map or two interface?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 12:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548509#M1087215</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-09T12:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548522#M1087216</link>
      <description>&lt;P&gt;hi rob,&lt;/P&gt;&lt;P&gt;yes IKE phase 1 and 2 are same on both ends.&lt;/P&gt;&lt;P&gt;it's just the crypto map applied on the WAN/ISP interface. is it because CUST-1 VRF is applied on the WAN?&lt;/P&gt;&lt;P&gt;although i got 'tunnel vrf CUST-1' applied on the tunnel used by CUST-2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2911#sh run int g0/1&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 226 bytes&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;ip vrf forwarding CUST-1&lt;/FONT&gt;&lt;BR /&gt;ip address 61.x.x.x162 255.255.255.252&lt;BR /&gt;duplex full&lt;BR /&gt;speed 100&lt;BR /&gt;crypto map CMAP&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Tunnel8&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;ip vrf forwarding CUST-2&lt;/FONT&gt;&lt;BR /&gt;ip address 172.x.x.4 255.255.255.252&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;tunnel source 172.x.x.16&lt;BR /&gt;tunnel destination 172.x.x.17&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;tunnel vrf CUST-1&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 12:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548522#M1087216</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-02-09T12:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548523#M1087217</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i only created a single crypto map applied on g0/1 interface which is facing ISP.&lt;/P&gt;&lt;P&gt;g0/1 is using CUST-1 VRF.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 12:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548523#M1087217</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-02-09T12:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548558#M1087219</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326072"&gt;@johnlloyd_13&lt;/a&gt; then surely the keyring for the new VPN should be in CUST-1 vrf?&lt;/P&gt;
&lt;P&gt;CUST-2 is the inside vrf for cleartext traffic, but CUST-1 is the outside interface where the VPN terminates. Right?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 13:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548558#M1087219</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-09T13:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548592#M1087221</link>
      <description>&lt;P&gt;That issue i think,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use loopback with vrf for each vpn,&lt;/P&gt;&lt;P&gt;Use this loopback as source for ipsec,&lt;/P&gt;&lt;P&gt;Make the outside interface in global.&lt;/P&gt;&lt;P&gt;This way the outside recive the ipsec and check the peer with vrf and use loopback to reply&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 13:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548592#M1087221</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-09T13:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548633#M1087230</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i managed to resolve it.&lt;/P&gt;&lt;P&gt;just added another PSK line under the same 'crypto keyring'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2911(conf-keyring)#do sh run | s crypto&lt;BR /&gt;crypto keyring CUST-1 vrf CUST-1&lt;BR /&gt;pre-shared-key address 20x.x.x.4 key &amp;lt;KEY-1&amp;gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;pre-shared-key address 202.x.x..41 key &amp;lt;KEY-2&amp;gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 14:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548633#M1087230</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2022-02-09T14:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548647#M1087231</link>
      <description>&lt;P&gt;This way two vpn same vrf,&lt;/P&gt;&lt;P&gt;If it ok for you it work.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 14:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/4548647#M1087231</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-09T14:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: 'crypto keyring' limit for VRF on IOS router</title>
      <link>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/5222295#M1117444</link>
      <description>&lt;P&gt;my case was with vrf,&amp;nbsp; if you have a vrf configured which I guess you are because you are getting the same logs than me you have to source the keyring from the vrf&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;crypto keyring my_keyring vrf MY_VRF&lt;BR /&gt;pre-shared-key address x.x.x.x key password&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2024 03:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/crypto-keyring-limit-for-vrf-on-ios-router/m-p/5222295#M1117444</guid>
      <dc:creator>ricardo.minier</dc:creator>
      <dc:date>2024-11-10T03:28:47Z</dc:date>
    </item>
  </channel>
</rss>

