10-03-2018 07:35 AM - edited 02-21-2020 09:28 PM
Hi
i am trying to establish ikev2 ipsec vpn with cisco 3945 and Microsoft Azure.
Cisco 3945 is using image c3900e-universalk9-mz.SPA.154-3.M2.bin.
ipsec does not come up and in the debug we keep getting following error that profile not found.
IKEv2:% IKEv2 profile not found
configuration of cisco 3945 is enclosed
Solved! Go to Solution.
10-03-2018 09:53 AM
I labbed this configuration, without the commands I've idenfied below and it worked ok. Try these modifications:-
crypto ikev2 profile GDH
no ivrf tp_hub
no match address local interface GigabitEthernet0/0 << you are already identifying the local router using the "identity local ...." command.
interface Tunnel1
no ip vrf forwarding internet_out
HTH
Please provide the debug output if this does not work
10-03-2018 07:51 AM
10-03-2018 07:54 AM
10-03-2018 07:58 AM
Well from the debug:
Oct 3 00:11:45.561: IKEv2:(SESSION ID = 314128,SA ID = 1):Searching policy based on peer's identity '137.117.166.71' of type 'IPv4 address'
Oct 3 00:11:45.561: IKEv2:% IKEv2 profile not found
The peer identity is not the same as you've defined in the IKEv2 Profile, so it would therefore not match that IKEv2 Profile. Or is that a fake IP address in your original configuration?
10-03-2018 08:28 AM
Hi
yes i changed the ip address in config i shared than original but debug is of original config
10-03-2018 08:44 AM
10-03-2018 09:11 AM
10-03-2018 09:53 AM
I labbed this configuration, without the commands I've idenfied below and it worked ok. Try these modifications:-
crypto ikev2 profile GDH
no ivrf tp_hub
no match address local interface GigabitEthernet0/0 << you are already identifying the local router using the "identity local ...." command.
interface Tunnel1
no ip vrf forwarding internet_out
HTH
Please provide the debug output if this does not work
10-04-2018 06:56 AM
thanks will try out the changes and come back
10-05-2018 07:22 AM
Hi thanks for your help, tunnel is up with your receommended config. can you suggest how do we define interesting traffic acl ?
10-05-2018 07:33 AM
10-05-2018 07:37 AM
thanks , that means routes for interesting traffic in global instead of vrf as the tunnel is in global ?
10-05-2018 07:43 AM
Hi we can see traffic arrive but no getting encapsulating, please see below
mr039r02#show crypto ipsec sa peer 137.117.166.71
interface: Tunnel1
Crypto map tag: Tunnel1-head-0, local addr 92.41.252.164
protected vrf: (none)
local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
current_peer 137.117.166.71 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 16, #pkts decrypt: 16, #pkts verify: 16
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 92.41.252.164, remote crypto endpt.: 137.117.166.71
plaintext mtu 1438, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0
current outbound spi: 0xBB569138(3143012664)
PFS (Y/N): N, DH group: none
inbound esp sas:
spi: 0xBCDDC2E8(3168649960)
transform: esp-256-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 4948, flow_id: Onboard VPN:2948, sibling_flags 80000040, crypto map: Tunnel1-head-0
sa timing: remaining key lifetime (k/sec): (4222050/3552)
IV size: 16 bytes
replay detection support: Y
Status: ACTIVE(ACTIVE)
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0xBB569138(3143012664)
transform: esp-256-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 4947, flow_id: Onboard VPN:2947, sibling_flags 80000040, crypto map: Tunnel1-head-0
sa timing: remaining key lifetime (k/sec): (4222051/3552)
IV size: 16 bytes
replay detection support: Y
Status: ACTIVE(ACTIVE)
outbound ah sas:
outbound pcp sas:
protected vrf: (none)
local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
current_peer 137.117.166.71 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 92.41.252.164, remote crypto endpt.: 137.117.166.71
plaintext mtu 1500, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0
current outbound spi: 0x0(0)
PFS (Y/N): N, DH group: none
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
mr039r02#
10-05-2018 07:57 AM
10-05-2018 08:17 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide