11-30-2016 08:33 AM - edited 03-12-2019 07:22 AM
I am running an AWS Transit VPC setup that automatically instantiates a CSR1000v and configures it. It comes up and works, but once or twice a day the IPSEC tunnels fail with the following messages:
*Nov 30 15:56:22.958: %CRYPTO-6-ISAKMP_MANUAL_DELETE: IKE SA manually deleted. Do 'clear crypto sa peer 52.32.1.245' to manually clear IPSec SA's covered by this IKE SA.
*Nov 30 15:57:19.388: %CRYPTO-6-ISAKMP_MANUAL_DELETE: IKE SA manually deleted. Do 'clear crypto sa peer 52.35.26.206' to manually clear IPSec SA's covered by this IKE SA.
Running 'clear crypto sa' recovers them, but this is an annoying manual process. The tunnels occasionally self-recover as well.
The auto-configuration scripts didn't run during that time so I'm very confused on what 'manually deleted' means.
The configuration is provided by AWS/CloudFormation so I am confident I haven't directly misconfigured something. Here is the config w/credentials stripped in case you can spot the issue:
Current configuration : 7694 bytes
!
! Last configuration change at 16:26:24 UTC Tue Nov 29 2016 by ec2-user
!
version 16.3
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
no platform punt-keepalive disable-kernel-core
platform console virtual
!
hostname ip-192-168-0-11
!
boot-start-marker
boot-end-marker
!
!
logging buffered 32000
logging persistent size 1000000 filesize 8192
!
no aaa new-model
!
ip vrf vpn-15736274
rd 64512:1
route-target export 64512:0
route-target import 64512:0
!
ip vrf vpn-b41009a6
rd 64512:3
route-target export 64512:0
route-target import 64512:0
!
ip vrf vpn0
rd 64512:0
!
subscriber templating
!
multilink bundle-name authenticated
!
crypto pki trustpoint TP-self-signed-2690167130
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2690167130
revocation-check none
rsakeypair TP-self-signed-2690167130
!
!
crypto pki certificate chain TP-self-signed-2690167130
certificate self-signed 01
x
quit
!
license udi pid CSR1000V sn x
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
username x
username y
!
redundancy
!
crypto keyring keyring-vpn-b41009a6-4
local-address GigabitEthernet1
pre-shared-key address 52.35.26.206 key x
crypto keyring keyring-vpn-b41009a6-3
local-address GigabitEthernet1
pre-shared-key address 52.32.1.245 key x
crypto keyring keyring-vpn-15736274-2
local-address GigabitEthernet1
pre-shared-key address 52.20.207.139 key x_b
crypto keyring keyring-vpn-15736274-1
local-address GigabitEthernet1
pre-shared-key address 23.22.23.82 key x
!
!
crypto isakmp policy 200
encr aes
authentication pre-share
group 2
lifetime 28800
crypto isakmp keepalive 10 10
crypto isakmp profile isakmp-vpn-15736274-1
keyring keyring-vpn-15736274-1
match identity address 23.22.23.82 255.255.255.255
local-address GigabitEthernet1
crypto isakmp profile isakmp-vpn-15736274-2
keyring keyring-vpn-15736274-2
match identity address 52.20.207.139 255.255.255.255
local-address GigabitEthernet1
crypto isakmp profile isakmp-vpn-b41009a6-3
keyring keyring-vpn-b41009a6-3
match identity address 52.32.1.245 255.255.255.255
local-address GigabitEthernet1
crypto isakmp profile isakmp-vpn-b41009a6-4
keyring keyring-vpn-b41009a6-4
match identity address 52.35.26.206 255.255.255.255
local-address GigabitEthernet1
!
crypto ipsec security-association replay window-size 1024
!
crypto ipsec transform-set ipsec-prop-vpn-aws esp-aes esp-sha-hmac
mode tunnel
crypto ipsec df-bit clear
!
!
crypto ipsec profile ipsec-vpn-aws
set transform-set ipsec-prop-vpn-aws
set pfs group2
!
interface Tunnel1
ip vrf forwarding vpn-15736274
ip address 169.254.44.154 255.255.255.252
ip tcp adjust-mss 1387
tunnel source GigabitEthernet1
tunnel mode ipsec ipv4
tunnel destination 23.22.23.82
tunnel protection ipsec profile ipsec-vpn-aws
ip virtual-reassembly
!
interface Tunnel2
ip vrf forwarding vpn-15736274
ip address 169.254.46.46 255.255.255.252
ip tcp adjust-mss 1387
tunnel source GigabitEthernet1
tunnel mode ipsec ipv4
tunnel destination 52.20.207.139
tunnel protection ipsec profile ipsec-vpn-aws
ip virtual-reassembly
!
interface Tunnel3
ip vrf forwarding vpn-b41009a6
ip address 169.254.14.202 255.255.255.252
ip tcp adjust-mss 1387
tunnel source GigabitEthernet1
tunnel mode ipsec ipv4
tunnel destination 52.32.1.245
tunnel protection ipsec profile ipsec-vpn-aws
ip virtual-reassembly
!
interface Tunnel4
ip vrf forwarding vpn-b41009a6
ip address 169.254.12.146 255.255.255.252
ip tcp adjust-mss 1387
tunnel source GigabitEthernet1
tunnel mode ipsec ipv4
tunnel destination 52.35.26.206
tunnel protection ipsec profile ipsec-vpn-aws
ip virtual-reassembly
!
interface GigabitEthernet1
ip address dhcp
negotiation auto
!
router bgp 64512
bgp log-neighbor-changes
!
address-family ipv4 vrf vpn-15736274
neighbor 169.254.44.153 remote-as 7224
neighbor 169.254.44.153 timers 10 30 30
neighbor 169.254.44.153 activate
neighbor 169.254.44.153 as-override
neighbor 169.254.44.153 soft-reconfiguration inbound
neighbor 169.254.46.45 remote-as 7224
neighbor 169.254.46.45 timers 10 30 30
neighbor 169.254.46.45 activate
neighbor 169.254.46.45 as-override
neighbor 169.254.46.45 soft-reconfiguration inbound
exit-address-family
!
address-family ipv4 vrf vpn-b41009a6
neighbor 169.254.12.145 remote-as 7224
neighbor 169.254.12.145 timers 10 30 30
neighbor 169.254.12.145 activate
neighbor 169.254.12.145 as-override
neighbor 169.254.12.145 soft-reconfiguration inbound
neighbor 169.254.14.201 remote-as 7224
neighbor 169.254.14.201 timers 10 30 30
neighbor 169.254.14.201 activate
neighbor 169.254.14.201 as-override
neighbor 169.254.14.201 soft-reconfiguration inbound
exit-address-family
!
virtual-service csr_mgmt
ip shared host-interface GigabitEthernet1
activate
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
ip ssh rsa keypair-name ssh-key
ip ssh version 2
ip ssh pubkey-chain
username ec2-user
key-hash ssh-rsa x ec2-user
username automate
key-hash ssh-rsa x
ip ssh server algorithm authentication publickey
!
control-plane
!
line con 0
stopbits 1
line vty 0 4
login local
transport input ssh
!
end
Any ideas what is occurring here?
Solved! Go to Solution.