05-24-2013 08:05 PM - edited 03-07-2019 01:33 PM
Hi all!
I have trouble with VPN access. I have search I-net but can't quite fine the solution. Please HELP!!!! below is the debug info
May 25 02:34:31.599: ISAKMP (0): received packet from xxx.xxx.xxx.xxx dport 500 sport 17348 Global (N) NEW SA
May 25 02:34:31.599: ISAKMP: Created a peer struct for xxx.xxx.xxx.xxx, peer port 17348
May 25 02:34:31.599: ISAKMP: New peer created peer = 0x2BA1981C peer_handle = 0x80000003
May 25 02:34:31.599: ISAKMP: Locking peer struct 0x2BA1981C, refcount 1 for crypto_isakmp_process_block
May 25 02:34:31.599: ISAKMP: local port 500, remote port 17348
May 25 02:34:31.599: ISAKMP:(0):insert sa successfully sa = 2BD65240
May 25 02:34:31.599: ISAKMP:(0): processing SA payload. message ID = 0
May 25 02:34:31.599: ISAKMP:(0): processing ID payload. message ID = 0
May 25 02:34:31.599: ISAKMP (0): ID payload
next-payload : 13
type : 11
group id : ECOCION-VPN
protocol : 17
port : 500
length : 19
May 25 02:34:31.603: ISAKMP:(0):: peer matches vpn-ike-profile-1 profile
May 25 02:34:31.603: ISAKMP:(0):Setting client config settings 2BA19490
May 25 02:34:31.603: ISAKMP:(0):(Re)Setting client xauth list and state
May 25 02:34:31.603: ISAKMP/xauth: initializing AAA request
May 25 02:34:31.603: ISAKMP:(0): processing vendor id payload
May 25 02:34:31.603: ISAKMP:(0): vendor ID seems Unity/DPD but major 215 mismatch
May 25 02:34:31.603: ISAKMP:(0): vendor ID is XAUTH
May 25 02:34:31.603: ISAKMP:(0): processing vendor id payload
May 25 02:34:31.603: ISAKMP:(0): vendor ID is DPD
May 25 02:34:31.603: ISAKMP:(0): processing vendor id payload
May 25 02:34:31.603: ISAKMP:(0): processing IKE frag vendor id payload
May 25 02:34:31.603: ISAKMP:(0):Support for IKE Fragmentation not enabled
May 25 02:34:31.603: ISAKMP:(0): processing vendor id payload
May 25 02:34:31.603: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
May 25 02:34:31.603: ISAKMP:(0): vendor ID is NAT-T v2
May 25 02:34:31.603: ISAKMP:(0): processing vendor id payload
May 25 02:34:31.603: ISAKMP:(0): vendor ID is Unity
May 25 02:34:31.603: ISAKMP:(0): Authentication by xauth preshared
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash SHA
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth XAUTHInitPreShared
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 256
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 2 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash MD5
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth XAUTHInitPreShared
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 256
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 3 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash SHA
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth pre-share
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 256
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 4 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash MD5
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth pre-share
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 256
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 5 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash SHA
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth XAUTHInitPreShared
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 128
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 6 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash MD5
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth XAUTHInitPreShared
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 128
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 7 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash SHA
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth pre-share
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 128
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 8 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption AES-CBC
May 25 02:34:31.603: ISAKMP: hash MD5
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth pre-share
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP: keylength of 128
May 25 02:34:31.603: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 25 02:34:31.603: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Checking ISAKMP transform 9 against priority 1 policy
May 25 02:34:31.603: ISAKMP: encryption 3DES-CBC
May 25 02:34:31.603: ISAKMP: hash SHA
May 25 02:34:31.603: ISAKMP: default group 2
May 25 02:34:31.603: ISAKMP: auth XAUTHInitPreShared
May 25 02:34:31.603: ISAKMP: life type in seconds
May 25 02:34:31.603: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 25 02:34:31.603: ISAKMP:(0):atts are acceptable. Next payload is 3
May 25 02:34:31.603: ISAKMP:(0):Acceptable atts:actual life: 86400
May 25 02:34:31.603: ISAKMP:(0):Acceptable atts:life: 0
May 25 02:34:31.603: ISAKMP:(0):Fill atts in sa vpi_length:4
May 25 02:34:31.603: ISAKMP:(0):Fill atts in sa life_in_seconds:2147483
May 25 02:34:31.603: ISAKMP:(0):Returning Actual lifetime: 86400
May 25 02:34:31.603: ISAKMP:(0)::Started lifetime timer: 86400.
May 25 02:34:31.603: ISAKMP:(0): processing KE payload. message ID = 0
May 25 02:34:31.623: ISAKMP:(0): processing NONCE payload. message ID = 0
May 25 02:34:31.623: ISAKMP:(0): vendor ID is NAT-T v2
May 25 02:34:31.623: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
May 25 02:34:31.623: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_AM_AAA_AWAIT
May 25 02:34:31.623: ISAKMP:(1002): constructed NAT-T vendor-02 ID
May 25 02:34:31.623: ISAKMP:(1002):SA is doing pre-shared key authentication plus XAUTH using id type ID_IPV4_ADDR
May 25 02:34:31.623: ISAKMP (1002): ID payload
next-payload : 10
type : 1
address : xxx.xxx.xxx.xxx
protocol : 0
port : 0
length : 12
May 25 02:34:31.623: ISAKMP:(1002):Total payload length: 12
May 25 02:34:31.627: ISAKMP:(1002): sending packet to xxx.xxx.xxx.xxx my_port 500 peer_port 17348 (R) AG_INIT_EXCH
May 25 02:34:31.627: ISAKMP:(1002):Sending an IKE IPv4 Packet.
May 25 02:34:31.627: ISAKMP:(1002):Input = IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY
May 25 02:34:31.627: ISAKMP:(1002):Old State = IKE_R_AM_AAA_AWAIT New State = IKE_R_AM2
May 25 02:34:36.971: ISAKMP (1002): received packet from xxx.xxx.xxx.xxx dport 500 sport 17348 Global (R) AG_INIT_EXCH
May 25 02:34:36.971: ISAKMP:(1002): phase 1 packet is a duplicate of a previous packet.
May 25 02:34:36.971: ISAKMP:(1002): retransmitting due to retransmit phase 1
May 25 02:34:37.471: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH...
May 25 02:34:37.471: ISAKMP (1002): incrementing error counter on sa, attempt 1 of 5: retransmit phase 1
May 25 02:34:37.471: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH
May 25 02:34:37.471: ISAKMP:(1002): sending packet to xxx.xxx.xxx.xxx my_port 500 peer_port 17348 (R) AG_INIT_EXCH
May 25 02:34:37.471: ISAKMP:(1002):Sending an IKE IPv4 Packet.
May 25 02:34:42.043: ISAKMP (1002): received packet from xxx.xxx.xxx.xxx dport 500 sport 17348 Global (R) AG_INIT_EXCH
May 25 02:34:42.043: ISAKMP:(1002): phase 1 packet is a duplicate of a previous packet.
May 25 02:34:42.043: ISAKMP:(1002): retransmitting due to retransmit phase 1
May 25 02:34:42.543: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH...
May 25 02:34:42.543: ISAKMP (1002): incrementing error counter on sa, attempt 2 of 5: retransmit phase 1
May 25 02:34:42.543: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH
May 25 02:34:42.543: ISAKMP:(1002): sending packet to xxx.xxx.xxx.xxx my_port 500 peer_port 17348 (R) AG_INIT_EXCH
May 25 02:34:42.543: ISAKMP:(1002):Sending an IKE IPv4 Packet.
May 25 02:34:47.135: ISAKMP (1002): received packet from xxx.xxx.xxx.xxx dport 500 sport 17348 Global (R) AG_INIT_
May 25 02:34:47.135: ISAKMP:(1002): phase 1 packet is a duplicate of a previous packet.
May 25 02:34:47.135: ISAKMP:(1002): retransmitting due to retransmit phase 1
May 25 02:34:47.635: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH...
May 25 02:34:47.635: ISAKMP (1002): incrementing error counter on sa, attempt 3 of 5: retransmit phase 1
May 25 02:34:47.635: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH
May 25 02:34:47.635: ISAKMP:(1002): sending packet to xxx.xxx.xxx.xxx my_port 500 peer_port 17348 (R) AG_INIT_EXCH
May 25 02:34:47.635: ISAKMP:(1002):Sending an IKE IPv4 Packet.
May 25 02:34:57.635: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH...
May 25 02:34:57.635: ISAKMP (1002): incrementing error counter on sa, attempt 4 of 5: retransmit phase 1
May 25 02:34:57.635: ISAKMP:(1002): retransmitting phase 1 AG_INIT_EXCH
May 25 02:34:57.635: ISAKMP:(1002): sending packet to xxx.xxx.xxx.xxx my_port 500 peer_port 17348 (R) AG_INIT_EXCH
May 25 02:34:57.635: ISAKMP:(1002):Sending an IKE IPv4 Packet.no debug all
05-29-2013 10:49 AM
Laura
If the log is empty then I would be curious what logging levels were selected for the client. Frequently they are set either to not log or at a very low level of sensitivity. Please verify that logging is enabled for the client and that the level is set to high.
HTH
Rick
05-29-2013 10:46 AM
Laura
It is helpful to know that you are using the Cisco VPN client. It does have the ability to generate log messages that might be helpful.When you start the client there is an option in the tool bar at the top on the main screen for log. After you click that then there is an option for log settings. Please set to the high level the logs for IKE, for Connection Manager, for User Authentication, and for IPSec. This will generate log messages when the client tries to connect. After you try to connect and it does not work, then you can use the log tab in the client window or the log/Log Window from the tool bar to view the log entries.
If you set the logging levels and then try to connect it is possible that the entries in the logs might help us to figure out what is going on.
HTH
Rick
05-29-2013 12:24 PM
ooohhh that is how it works!!! ))))
Cisco Systems VPN Client Version 5.0.07.0440
Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.1.7601 Service Pack 1
Config file directory: C:\Program Files (x86)\Cisco Systems\VPN Client\
1 13:21:11.483 05/29/13 Sev=Info/4 CM/0x63100002
Begin connection process
2 13:21:11.486 05/29/13 Sev=Info/4 CM/0x63100004
Establish secure connection
3 13:21:11.486 05/29/13 Sev=Info/4 CM/0x63100024
Attempt connection with server "xxx.xxx.xxx.xxx."
4 13:21:11.488 05/29/13 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with xxx.xxx.xxx.xxx..
5 13:21:11.492 05/29/13 Sev=Info/4 IKE/0x63000001
Starting IKE Phase 1 Negotiation
6 13:21:11.496 05/29/13 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to xxx.xxx.xxx.xxx.
7 13:21:11.498 05/29/13 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
8 13:21:11.498 05/29/13 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
9 13:21:16.883 05/29/13 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
10 13:21:16.883 05/29/13 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to xxx.xxx.xxx.xxx.
11 13:21:21.953 05/29/13 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
12 13:21:21.953 05/29/13 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to xxx.xxx.xxx.xxx.
13 13:21:27.024 05/29/13 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
14 13:21:27.024 05/29/13 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to xxx.xxx.xxx.xxx.
15 13:21:32.097 05/29/13 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=63BFB4B652B836FF R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
16 13:21:32.608 05/29/13 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=63BFB4B652B836FF R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
17 13:21:32.608 05/29/13 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "xxx.xxx.xxx.xxx." because of "DEL_REASON_PEER_NOT_RESPONDING"
18 13:21:32.608 05/29/13 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
19 13:21:32.612 05/29/13 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
20 13:21:32.612 05/29/13 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
21 13:21:33.109 05/29/13 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
22 13:21:33.109 05/29/13 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
23 13:21:33.109 05/29/13 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
24 13:21:33.109 05/29/13 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
05-29-2013 12:50 PM
Laura
Yes that is pretty much how it works.
The good news is that we did get some logs from the client. However the logs are not as helpful as I had hoped. The point that I think is worth noting is at msg 5 & 6 the client is starting IKE and sending parameters. Starting at msg 9 the client begins retransmitting and continues to retransmit and does not receive any response from the router. And at msg 15 the client gives up.
I thought that the router debug from early in the thread showed that IKE phase 1 had worked. Could you test again and send a fresh debug from the router?
HTH
Rick
05-29-2013 01:04 PM
Rick,
Here is debug crypto isakmp
EcocionRTR#debug crypto isakmp
Crypto ISAKMP debugging is on
EcocionRTR#
May 29 19:55:49.171: ISAKMP (0): received packet from ccc.ccc.ccc.ccc dport 500 sport 58089 Global (N) NEW SA
May 29 19:55:49.175: ISAKMP: Created a peer struct for 75.166.102.253, peer port 58089
May 29 19:55:49.175: ISAKMP: New peer created peer = 0x31A9393C peer_handle = 0x8000001A
May 29 19:55:49.175: ISAKMP: Locking peer struct 0x31A9393C, refcount 1 for crypto_isakmp_process_block
May 29 19:55:49.175: ISAKMP: local port 500, remote port 58089
May 29 19:55:49.175: ISAKMP:(0):insert sa successfully sa = 3199985C
May 29 19:55:49.175: ISAKMP:(0): processing SA payload. message ID = 0
May 29 19:55:49.175: ISAKMP:(0): processing ID payload. message ID = 0
May 29 19:55:49.175: ISAKMP (0): ID payload
next-payload : 13
type : 11
group id : ECOCION-VPN
protocol : 17
port : 500
length : 19
May 29 19:55:49.175: ISAKMP:(0):: peer matches vpn-ike-profile-1 profile
May 29 19:55:49.175: ISAKMP:(0):Setting client config settings 307E939C
May 29 19:55:49.175: ISAKMP:(0):(Re)Setting client xauth list and state
May 29 19:55:49.175: ISAKMP/xauth: initializing AAA request
May 29 19:55:49.175: ISAKMP:(0): processing vendor id payload
May 29 19:55:49.175: ISAKMP:(0): vendor ID seems Unity/DPD but major 215 mismatch
May 29 19:55:49.175: ISAKMP:(0): vendor ID is XAUTH
May 29 19:55:49.175: ISAKMP:(0): processing vendor id payload
May 29 19:55:49.175: ISAKMP:(0): vendor ID is DPD
May 29 19:55:49.175: ISAKMP:(0): processing vendor id payload
May 29 19:55:49.175: ISAKMP:(0): processing IKE frag vendor id payload
May 29 19:55:49.175: ISAKMP:(0):Support for IKE Fragmentation not enabled
May 29 19:55:49.175: ISAKMP:(0): processing vendor id payload
May 29 19:55:49.175: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
May 29 19:55:49.175: ISAKMP:(0): vendor ID is NAT-T v2
May 29 19:55:49.175: ISAKMP:(0): processing vendor id payload
May 29 19:55:49.175: ISAKMP:(0): vendor ID is Unity
May 29 19:55:49.175: ISAKMP:(0): Authentication by xauth preshared
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash SHA
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth XAUTHInitPreShared
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 256
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.175: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 2 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash MD5
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth XAUTHInitPreShared
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 256
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.175: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 3 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash SHA
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth pre-share
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 256
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.175: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 4 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash MD5
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth pre-share
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 256
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.175: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 5 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash SHA
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth XAUTHInitPreShared
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 128
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.175: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 6 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash MD5
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth XAUTHInitPreShared
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 128
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.175: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 7 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash SHA
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth pre-share
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 128
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.175: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.175: ISAKMP:(0):Checking ISAKMP transform 8 against priority 1 policy
May 29 19:55:49.175: ISAKMP: encryption AES-CBC
May 29 19:55:49.175: ISAKMP: hash MD5
May 29 19:55:49.175: ISAKMP: default group 2
May 29 19:55:49.175: ISAKMP: auth pre-share
May 29 19:55:49.175: ISAKMP: life type in seconds
May 29 19:55:49.175: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.175: ISAKMP: keylength of 128
May 29 19:55:49.175: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 29 19:55:49.179: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 29 19:55:49.179: ISAKMP:(0):Checking ISAKMP transform 9 against priority 1 policy
May 29 19:55:49.179: ISAKMP: encryption 3DES-CBC
May 29 19:55:49.179: ISAKMP: hash SHA
May 29 19:55:49.179: ISAKMP: default group 2
May 29 19:55:49.179: ISAKMP: auth XAUTHInitPreShared
May 29 19:55:49.179: ISAKMP: life type in seconds
May 29 19:55:49.179: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
May 29 19:55:49.179: ISAKMP:(0):atts are acceptable. Next payload is 3
May 29 19:55:49.179: ISAKMP:(0):Acceptable atts:actual life: 86400
May 29 19:55:49.179: ISAKMP:(0):Acceptable atts:life: 0
May 29 19:55:49.179: ISAKMP:(0):Fill atts in sa vpi_length:4
May 29 19:55:49.179: ISAKMP:(0):Fill atts in sa life_in_seconds:2147483
May 29 19:55:49.179: ISAKMP:(0):Returning Actual lifetime: 86400
May 29 19:55:49.179: ISAKMP:(0)::Started lifetime timer: 86400.
May 29 19:55:49.179: ISAKMP:(0): processing KE payload. message ID = 0
May 29 19:55:49.195: ISAKMP:(0): processing NONCE payload. message ID = 0
May 29 19:55:49.195: ISAKMP:(0): vendor ID is NAT-T v2
May 29 19:55:49.195: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
May 29 19:55:49.195: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_AM_AAA_AWAIT
May 29 19:55:49.199: ISAKMP:(1025): constructed NAT-T vendor-02 ID
May 29 19:55:49.199: ISAKMP:(1025):SA is doing pre-shared key authentication plus XAUTH using id type ID_IPV4_ADDR
May 29 19:55:49.199: ISAKMP (1025): ID payload
next-payload : 10
type : 1
address : 97.65.195.68
protocol : 0
port : 0
length : 12
May 29 19:55:49.199: ISAKMP:(1025):Total payload length: 12
May 29 19:55:49.199: ISAKMP:(1025): sending packet to ccc.ccc.ccc.ccc my_port 500 peer_port 58089 (R) AG_INIT_EXCH
May 29 19:55:49.199: ISAKMP:(1025):Sending an IKE IPv4 Packet.
May 29 19:55:49.199: ISAKMP:(1025):Input = IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY
May 29 19:55:49.199: ISAKMP:(1025):Old State = IKE_R_AM_AAA_AWAIT New State = IKE_R_AM2
May 29 19:55:54.631: ISAKMP (1025): received packet from ccc.ccc.ccc.ccc dport 500 sport 58089 Global (R) AG_INIT_EXCH
May 29 19:55:54.631: ISAKMP:(1025): phase 1 packet is a duplicate of a previous packet.
May 29 19:55:54.631: ISAKMP:(1025): retransmitting due to retransmit phase 1
May 29 19:55:55.131: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH...
May 29 19:55:55.131: ISAKMP (1025): incrementing error counter on sa, attempt 1 of 5: retransmit phase 1
May 29 19:55:55.131: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH
May 29 19:55:55.131: ISAKMP:(1025): sending packet to ccc.ccc.ccc.ccc my_port 500 peer_port 58089 (R) AG_INIT_EXCH
May 29 19:55:55.131: ISAKMP:(1025):Sending an IKE IPv4 Packet.
May 29 19:55:59.711: ISAKMP (1025): received packet from ccc.ccc.ccc.ccc dport 500 sport 58089 Global (R) AG_INIT_EXCH
May 29 19:55:59.711: ISAKMP:(1025): phase 1 packet is a duplicate of a previous packet.
May 29 19:55:59.711: ISAKMP:(1025): retransmitting due to retransmit phase 1
May 29 19:56:00.211: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH...
May 29 19:56:00.211: ISAKMP (1025): incrementing error counter on sa, attempt 2 of 5: retransmit phase 1
May 29 19:56:00.211: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH
May 29 19:56:00.211: ISAKMP:(1025): sending packet to ccc.ccc.ccc.ccc my_port 500 peer_port 58089 (R) AG_INIT_EXCH
May 29 19:56:00.211: ISAKMP:(1025):Sending an IKE IPv4 Packet.
May 29 19:56:04.771: ISAKMP (1025): received packet from ccc.ccc.ccc.ccc dport 500 sport 58089 Global (R) AG_INIT_EXCH
May 29 19:56:04.771: ISAKMP:(1025): phase 1 packet is a duplicate of a previous packet.
May 29 19:56:04.771: ISAKMP:(1025): retransmitting due to retransmit phase 1
May 29 19:56:05.271: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH...
May 29 19:56:05.271: ISAKMP (1025): incrementing error counter on sa, attempt 3 of 5: retransmit phase 1
May 29 19:56:05.271: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH
May 29 19:56:05.271: ISAKMP:(1025): sending packet to ccc.ccc.ccc.ccc my_port 500 peer_port 58089 (R) AG_INIT_EXCH
May 29 19:56:05.271: ISAKMP:(1025):Sending an IKE IPv4 Packet.
May 29 19:56:15.271: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH...
May 29 19:56:15.271: ISAKMP (1025): incrementing error counter on sa, attempt 4 of 5: retransmit phase 1
May 29 19:56:15.271: ISAKMP:(1025): retransmitting phase 1 AG_INIT_EXCH
May 29 19:56:15.271: ISAKMP:(1025): sending packet to ccc.ccc.ccc.ccc my_port 500 peer_port 58089 (R) AG_INIT_EXCH
May 29 19:56:15.271: ISAKMP:(1025):Sending an IKE IPv4 Packet.no debug all
All possible debugging has been turned off
05-29-2013 02:14 PM
Laura
Thanks for the additional debug. Like the earlier one it seems pretty normal down to this point
IKE_MESG_FROM_AAA, PRESHARED_KEY_REPLY
May 29 19:55:49.199: ISAKMP:(1025):Old State = IKE_R_AM_AAA_AWAIT New State = IKE_R_AM2
Then there is a bit of delay and the retransmitting begins. I am puzzled at what is going on here. Is there any chance that you are coming from a different source address or perhaps to a different server address (some DNS or DHCP change or something)?
I am wondering a bit if access list 140 is doing something. Can you check on that ACL?
HTH
Rick
05-29-2013 07:47 PM
Laura
Can we try another test. And in this test in addition to debug crypto isakmp can we also run debug crypto isakmp aaa and debug crypto isakmp error
HTH
Rick
05-30-2013 07:04 AM
Thank you for the response! Below are the outputs of the debugs
RTR#debug crypto isakmp aaa
Crypto ISAKMP AAA debugging is on
RTR#
May 30 13:55:34.527: ISAKMP AAA: NAS Port Id is set to 97.65.195.68
May 30 13:55:34.527: ISAKMP:(0):AAA: Nas Port ID set to 97.65.195.68.
May 30 13:55:34.527: ISAKMP/aaa: unique id = 56
May 30 13:55:34.547: ISAKMP:(0):ISAKMP/tunnel: setting up tunnel Client-VPN pw request
May 30 13:55:34.547: ISAKMP:(0):ISAKMP/tunnel: Tunnel Client-VPN PW Request successfully sent to AAA
May 30 13:55:34.547: ISAKMP:(0):ISAKMP/tunnel: received callback from AAA
AAA/AUTHOR/IKE: Processing AV tunnel-password
AAA/AUTHOR/IKE: Processing AV default-domain
AAA/AUTHOR/IKE: Processing AV addr-pool
AAA/AUTHOR/IKE: Processing AV inacl
AAA/AUTHOR/IKE: Processing AV dns-servers
AAA/AUTHOR/IKE: Processing AV wins-servers
AAA/AUTHOR/IKE: Processing AV route-metric
AAA/AUTHOR/IKE: Processing AV max-users
May 30 13:55:34.547: ISAKMP/tunnel: received tunnel atts
RTR#debug crypto isakmp error
Crypto ISAKMP Error debugging is on
RTR#
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
May 30 13:58:58.655: ISAKMP:(0):Encryption algorithm offered does not match policy!
May 30 13:58:58.655: ISAKMP:(0):atts are not acceptable. Next payload is 3
05-30-2013 01:47 PM
Laura
Thank you for running the additional tests with additional debug.
The output of debug crypto isakmp error is very consistent with what we saw in the first set of debug - eight times the client proposes a set of attributes which are not accepted and cause an error. Then the ninth set of attributes is accepted.
The output of debug crypto isakmp aaa seems to give us some information that we did not have before. I think what it is showing us is that the authentication of the group ID and password (part of the VPN client profile) is submitted and is successful. And for some reason it does not get to the point where it should prompt for the user ID and password.
I am puzzled what is causing this.
HTH
Rick
05-30-2013 01:54 PM
Rick,
I'm puzzled as well. It was working fine and suddenly this... I thought may be I entered some bad config and forgot so I restored the last good config and it still did not work... That is why I thought may be it was T1 issue since nothing have changed in the config...
Thank you for not giving up and trying to help...
05-30-2013 02:23 PM
Laura
You are quie welcome. This has become quite an interesting puzzle to try to solve. I have a couple of things that I want to look into.
There are a couple of possibilities that I want to ask about
- is it possible that there has been a code upgrade on the router or any other change in the network environment (perhaps if there is a firewall examining this traffic or something like that) that could be causing it to stop working?
- is it possible that there has been some kind of Windows update or any other administrative change that could have changed the working environment of the PCs?
HTH
Rick
05-30-2013 02:30 PM
There was no upgrate. I'm the only person who handles the router and I did not upgrade anything. Also there is no firewall besides this router. There is a OUTburst 1212 whichis our T1 that goes into the cisco router.... Now regarding PC... I have like 10 users who can''t use VPN due to this issue. If it was a PC it would be just one PC, all 10 PC unable to connect... I don't think this is PC...
06-02-2013 11:01 AM
Rick,
I think I have figured the problem. I did some mess with the firewall. I have made some changes. Now VPN Connects and gets the IP address but then I can't ping anything once I connected to the network. It says that I connected and it acts like I'm connected but no access to any servers or anything I can't even ping gateway. so I ran this:
RTR#sho crypto session detail
Crypto session current status
Code: C - IKE Configuration mode, D - Dead Peer Detection
K - Keepalives, N - NAT-traversal, T - cTCP encapsulation
X - IKE Extended Authentication, F - IKE Fragmentation
Interface: Virtual-Access1
Username:CISCOUSER
Profile: vpn-ike-profile-1
Group: CISCOVPN
Assigned address:10.202.25.4
Uptime: 00:00:30
Session status: UP-ACTIVE
Peer: ccc.ccc.ccc.ccc port 13483 fvrf: (none) ivrf: (none)
Phase1_id: CISCOVPN
Desc: (none)
IKEv1 SA: local xxx.xxx.xxx.xxx/4500 remote ccc.ccc.ccc.ccc/13483 Active
Capabilities:CXN connid:1017 lifetime:23:59:24
IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 host 10.202.25.4
Active SAs: 2, origin: crypto map
Inbound: #pkts dec'ed 163 drop 0 life (KB/Sec) 4385892/3569
Outbound: #pkts enc'ed 88 drop 0 life (KB/Sec) 4385923/3569
Interface: FastEthernet0/0/1
Profile: vpn-ike-profile-1
Session status: DOWN-NEGOTIATING
Peer: ccc.ccc.ccc.ccc port 13475 fvrf: (none) ivrf: (none)
Desc: (none)
Phase1_id: (none)
IKEv1 SA: local xxx.xxx.xxx.xxx/4500 remote ccc.ccc.ccc.ccc/13475 Inactive
Capabilities:N connid:1016 lifetime:0
What do you think?
06-02-2013 11:41 AM
Laura
I am glad that you have made some progress with this problem and can now establish a VPN connection. I am puzzled at the symptom that you are not able to access any resources. Can I ask if that is true both for resources on inside interfaces and for resources outside of your network?
Is the address assigned (10.202.25.4 according to your display) a proper VPN address from the pool? If you do ipconfig is that the address that it shows?
I notice this in the output
Interface: FastEthernet0/0/1
Profile: vpn-ike-profile-1
Session status: DOWN-NEGOTIATING
It would seem that perhaps the negotiation is not yet completed?
I wonder if another test while running both debug crypto isakmp and debug crypto ipsec would show us anything useful?
HTH
Rick
06-02-2013 11:55 PM
Dear Laura,
As the crypto session is Up and active ,i think you shoudl further check the routing
Thanks
Shanil
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide