01-20-2010 03:45 AM
Dear sirs,
Allow me to approach you about the following problem.
I wanted to use a secure connection between Cisco VPN client
(Windows XP) and Cisco 2821 with certificate authentication.
I used Microsoft certificate authority (Windows 2003 server).
Cisco VPN client used eTokenPRO Aladdin as a certificate store.
Enrollment certificate to MSW CA and its placing into eToken ran O.K.
Cisco VPN client hasn't problem with eToken cooperation.
Enrollment certificate from Cisco2821 to MSW CA ran O.K. too.
Cisco 2821 configuration is standard. IOS version 12.4(6).
Connection attempt from Cisco VPN client to Cisco 2821 was
terminated with error messages:
ISAKMP:(1020):Unable to get router cert or routerdoes not have a cert: needed to find DN!
ISAKMP:(1020):SA is doing RSA signature authentication plus XAUTH using id type ID_FQDN
ISAKMP (1020): ID payload
next-payload : 6
type : 2
FQDN name : cisco-ca.firm.com
protocol : 17
port : 500
length : 25
ISAKMP:(1020):Total payload length: 25
ISAKMP (1020): no cert chain to send to peer
ISAKMP (1020): peer did not specify issuer and no suitable profile found
ISAKMP (1020): FSM action returned error: 2
ISAKMP:(1020):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
ISAKMP:(1020):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE
Are there some refence where is possible to find some information about
this problem? Exists somebody who knows how figure it out these errors?
Thank you very much for your help.
Best regards
P.Sonenberk
P.S. Some more informations for people who was interested in problem above.
Cisco 2821 IP address is 10.1.1.220, client VPN IP address is 10.1.1.133.
MSW CA has IP 10.1.1.50.
Important parts of the Cisco 2821 configuration:
!
hostname cisco-ca
!
................
aaa new-model
!
aaa authentication login default local
aaa authentication login sdm_vpn_xauth_ml_1 local
aaa authorization exec default local
aaa authorization network sdm_vpn_group_ml_1 local
!
...............
ip domain name firm.com
ip host firm-cu 10.1.1.50
ip host cisco-vpn1 10.1.1.133
ip name-server 10.1.1.33
!
multilink bundle-name authenticated
!
crypto pki trustpoint TP-self-signed-4097309259
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4097309259
revocation-check none
rsakeypair TP-self-signed-4097309259
!
crypto pki trustpoint firm-cu
enrollment mode ra
enrollment url http://10.1.1.50:80/certsrv/mscep/mscep.dll
usage ike
serial-number none
ip-address none
password 7 005C31272503535729701A1B5E40523647
revocation-check none
!
crypto pki certificate chain TP-self-signed-4097309259
certificate self-signed 01
30820249 308201B2 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
.............
FEDDCCEA 8FD14836 24CDD736 34
quit
crypto pki certificate chain firm-cu
certificate 1150A66F000100000013
30820509 308203F1 A0030201 02020A11 50A66F00 01000000 13300D06 092A8648
...............
9E417C44 2062BFD5 F4FB9C0B AA
quit
certificate ca 51BAC7C822D1F6A3469D1ADC32D0EB8C
30820489 30820371 A0030201 02021051 BAC7C822 D1F6A346 9D1ADC32 D0EB8C30
...............
C379F382 36E0A54E 0A6278A7 46
quit
!
...................
crypto isakmp policy 30
encr 3des
hash md5
authentication rsa-encr
group 2
crypto isakmp identity hostname
!
crypto isakmp client configuration group Group159
key Key159Key
pool SDM_POOL_1
acl 100
!
crypto isakmp client configuration group it
domain firm.com
pool SDM_POOL_1
acl 100
!
crypto ipsec transform-set 3DES-MD5 esp-3des esp-md5-hmac
!
crypto dynamic-map SDM_DYNMAP_1 1
set transform-set 3DES-MD5
reverse-route
!
crypto map SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
crypto map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1
crypto map SDM_CMAP_1 client configuration address respond
crypto map SDM_CMAP_1 65535 ipsec-isakmp dynamic SDM_DYNMAP_1
!
................
!
end
cisco-ca#show crypto pki trustpoints firm-cu status
Trustpoint firm-cu:
Issuing CA certificate configured:
Subject Name:
cn=firm-cu,dc=firm,dc=local
Fingerprint MD5: 5026582F 56151047 8CF455F8 2FFAC0D6
Fingerprint SHA1: 47B74974 7C85EA48 760516DE AAC84C5D 4427E829
Router General Purpose certificate configured:
Subject Name:
hostname=cisco-ca.firm.com
Fingerprint MD5: E78702ED 47D5D36F B732CC4C BA97A4ED
Fingerprint SHA1: 78DEAE7E ACC12F15 1DFB4EB8 7FC00138 DC6F3B7E
State:
Keys generated ............. Yes (General Purpose, non-exportable)
Issuing CA authenticated ....... Yes
Certificate request(s) ..... Yes
cisco-ca#sh crypto key pubkey-chain rsa
Codes: M - Manually configured, C - Extracted from certificate
Code Usage IP-Address/VRF Keyring Name
C Signing default X.500 DN name:
cn=firm-cu
dc=firm
dc=local
C Signing default cisco-vpn1
IMPORTANT: I hasn't Cisco IOS Software: 12.4(5), 12.3(11)T08, 12.4(4.7)PI03c,
12.4(4.7)T - there is mistake in crypto modul.
Solved! Go to Solution.
01-27-2010 09:23 AM
Hey guys, It is odd that the router is not finding the cert after the IKE matches the cert and validates it, I this certainly is not right, however I would go ahead and configure certificate mapping on this router to force the client to be matched to a specific IKE group, for that matter you will need to change your config a little bit to use iskamp profiles:
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t8/feature/guide/gt_isakp.html
01-20-2010 10:31 PM
Please change isakmp policy command "authentication rsa-encr" to "authentication rsa-sig" and try it again.
01-21-2010 02:59 AM
Good morning,
thank you very much for your advice, time and your interest.
But I've got these raws in the cisco router configuration:
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp policy 20
encr 3des
hash md5
group 2
!
crypto isakmp policy 30
encr 3des
hash md5
authentication rsa-encr
group 2
crypto isakmp identity hostname
!
crypto isakmp client configuration group Group159
key Key159Key
pool SDM_POOL_1
acl 100
!
crypto isakmp client configuration group it
domain firm.com
pool SDM_POOL_1
acl 100
!
crypto ipsec transform-set 3DES-MD5 esp-3des esp-md5-hmac
!
crypto dynamic-map SDM_DYNMAP_1 1
set transform-set 3DES-MD5
reverse-route
!
crypto map SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
crypto map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1
crypto map SDM_CMAP_1 client configuration address respond
crypto map SDM_CMAP_1 65535 ipsec-isakmp dynamic SDM_DYNMAP_1
The group of the policy number 20 has "authentication rsa-sig" implicit on.
I'm afraid the problem is elsewhere or I don't understand your advice.
Thank you for your cooperate, have a nice rest of this day.
P.Sonenberk
kwu2 napsal(a):
Peter Sonenberk,
>
A new message was posted in the Discussion thread "Cisco VPN client + Cisco router + MSW CA + certificates":
>
https://supportforums.cisco.com/message/3005694#3005694
>
Author : Kevin Wu
Profile : https://supportforums.cisco.com/people/kwu2
>
Message:
01-21-2010 08:54 PM
Well, in your first post, you did not include the other isakmp policy, I though isakmp policy 30 is the only one.
You'd better to provide the debug output for us to help.
debug crypto isa
debug crypto ipsec
debug crypto pki (there are some options follow)
01-22-2010 02:49 AM
Good morning,
I'm terribly sorry. Yes, there wasn't full cisco configuration in my first question.
I'm glad you want to find a solution.
Well, I've used these debug command:
debug crypto pki messages, debug crypto pki transaction, debug crypto isakmp,
debug crypto ipsec
And there are two devices:
Cisco 2821 IP address is 10.1.1.220, cisco-ca.firm.com.
Personal computer MSW XP client VPN IP address is 10.1.1.133, cisco-vpn1.firm.com,
with certificate e=jarda@firm.com,cn=cisco-vpn1,ou=it,o=Firm Ltd.,l=Town,st=Discrict,c=State
List of certificates in cisco2821:
---> cisco-ca#sh crypto ca certificate
Certificate
Status: Available
Certificate Serial Number (hex): 1150A66F000100000013
Certificate Usage: General Purpose
Issuer:
cn=firm-cu
dc=firm
dc=local
Subject:
Name: cisco-ca.firm.com
hostname=cisco-ca.firm.com
CRL Distribution Points:
ldap:///CN=firm-cu(1),CN=server,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=firm,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
http://server.firm.local/CertEnroll/firm-cu(1).crl
Validity Date:
start date: 14:02:31 UTC Jan 14 2010
end date: 14:12:31 UTC Jan 14 2011
Associated Trustpoints: firm-cu
Storage: nvram:firm-cu#0.cer
CA Certificate
Status: Available
Certificate Serial Number (hex): 51BAC7C822D1F6A3469D1ADC32D0EB8C
Certificate Usage: Signature
Issuer:
cn=firm-cu
dc=firm
dc=local
Subject:
cn=firm-cu
dc=firm
dc=local
CRL Distribution Points:
ldap:///CN=firm-cu(1),CN=server,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=firm,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint
http://server.firm.local/CertEnroll/firm-cu(1).crl
Validity Date:
start date: 07:54:54 UTC Jan 8 2010
end date: 08:00:47 UTC Jan 9 2015
Associated Trustpoints: firm-cu
Storage: nvram:firm-cu#EBEBCA.cer
Router Self-Signed Certificate
Status: Available
Certificate Serial Number (hex): 01
Certificate Usage: General Purpose
Issuer:
cn=IOS-Self-Signed-Certificate-4097309259
Subject:
Name: IOS-Self-Signed-Certificate-4097309259
cn=IOS-Self-Signed-Certificate-4097309259
Validity Date:
start date: 09:25:18 UTC Jan 11 2010
end date: 00:00:00 UTC Jan 1 2020
Associated Trustpoints: TP-self-signed-4097309259
Storage: nvram:IOS-Self-Sig#1.cer
---> cisco-ca#sh crypto ca trustpoints status
Trustpoint TP-self-signed-4097309259:
Issuing CA certificate configured:
Subject Name:
cn=IOS-Self-Signed-Certificate-4097309259
Fingerprint MD5: D9F8C55D 7F669FC8 C40814AC 502D6F87
Fingerprint SHA1: 7D03D8E0 6489298F 33B97406 EA6655DC 81AB9351
Router General Purpose certificate configured:
Subject Name:
cn=IOS-Self-Signed-Certificate-4097309259
Fingerprint MD5: D9F8C55D 7F669FC8 C40814AC 502D6F87
Fingerprint SHA1: 7D03D8E0 6489298F 33B97406 EA6655DC 81AB9351
State:
Keys generated ............. Yes (General Purpose, non-exportable)
Issuing CA authenticated ....... Yes
Certificate request(s) ..... Yes
Trustpoint firm-cu:
Issuing CA certificate configured:
Subject Name:
cn=firm-cu,dc=firm,dc=local
Fingerprint MD5: 5026582F 56151047 8CF455F8 2FFAC0D6
Fingerprint SHA1: 47B74974 7C85EA48 760516DE AAC84C5D 4427E829
Router General Purpose certificate configured:
Subject Name:
hostname=cisco-ca.firm.com
Fingerprint MD5: E78702ED 47D5D36F B732CC4C BA97A4ED
Fingerprint SHA1: 78DEAE7E ACC12F15 1DFB4EB8 7FC00138 DC6F3B7E
State:
Keys generated ............. Yes (General Purpose, non-exportable)
Issuing CA authenticated ....... Yes
Certificate request(s) ..... Yes
---> cisco-ca#sh crypto key pubkey-chain rsa
Codes: M - Manually configured, C - Extracted from certificate
Code Usage IP-Address/VRF Keyring Name
C Signing default X.500 DN name:
cn=firm-cu
dc=firm
dc=local
C Signing default cisco-vpn1
And here are raws of the debug log:
Jan 22 08:18:50.724: ISAKMP (0): received packet from 10.1.1.133 dport 500 sport 500 Global (N) NEW SA
Jan 22 08:18:50.724: ISAKMP: Created a peer struct for 10.1.1.133, peer port 500
Jan 22 08:18:50.724: ISAKMP: New peer created peer = 0x47106BCC peer_handle = 0x80000002
Jan 22 08:18:50.724: ISAKMP: Locking peer struct 0x47106BCC, refcount 1 for crypto_isakmp_process_block
Jan 22 08:18:50.724: ISAKMP:(0):Setting client config settings 471083E0
Jan 22 08:18:50.724: ISAKMP:(0):(Re)Setting client xauth list and state
Jan 22 08:18:50.724: ISAKMP/xauth: initializing AAA request
Jan 22 08:18:50.728: ISAKMP: local port 500, remote port 500
Jan 22 08:18:50.728: ISAKMP:(0):insert sa successfully sa = 47093EF0
Jan 22 08:18:50.728: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jan 22 08:18:50.728: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_MM1
Jan 22 08:18:50.728: ISAKMP:(0): processing SA payload. message ID = 0
Jan 22 08:18:50.728: ISAKMP:(0): processing vendor id payload
Jan 22 08:18:50.728: ISAKMP:(0): vendor ID seems Unity/DPD but major 215 mismatch
Jan 22 08:18:50.728: ISAKMP:(0): vendor ID is XAUTH
Jan 22 08:18:50.728: ISAKMP:(0): processing vendor id payload
Jan 22 08:18:50.732: ISAKMP:(0): vendor ID is DPD
Jan 22 08:18:50.732: ISAKMP:(0): processing vendor id payload
Jan 22 08:18:50.732: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
Jan 22 08:18:50.732: ISAKMP:(0): vendor ID is NAT-T v2
Jan 22 08:18:50.732: ISAKMP:(0): processing vendor id payload
Jan 22 08:18:50.732: ISAKMP:(0): processing IKE frag vendor id payload
Jan 22 08:18:50.732: ISAKMP:(0):Support for IKE Fragmentation not enabled
Jan 22 08:18:50.732: ISAKMP:(0): processing vendor id payload
Jan 22 08:18:50.732: ISAKMP:(0): vendor ID is Unity
Jan 22 08:18:50.732: ISAKMP:(0):No pre-shared key with 10.1.1.133!
Jan 22 08:18:50.732: %CRYPTO-6-IKMP_NO_PRESHARED_KEY: Pre-shared key for remote peer at 10.1.1.133 is missing
Jan 22 08:18:50.732: ISAKMP:(0): Authentication by xauth preshared
Jan 22 08:18:50.732: ISAKMP:(0):Checking ISAKMP transform 1 against priority 1 policy
Jan 22 08:18:50.732: ISAKMP: encryption AES-CBC
Jan 22 08:18:50.732: ISAKMP: hash SHA
Jan 22 08:18:50.732: ISAKMP: default group 5
Jan 22 08:18:50.732: ISAKMP: auth XAUTHInitRSA
Jan 22 08:18:50.732: ISAKMP: life type in seconds
Jan 22 08:18:50.732: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
Jan 22 08:18:50.732: ISAKMP: keylength of 256
Jan 22 08:18:50.732: ISAKMP:(0):Encryption algorithm offered does not match policy!
Jan 22 08:18:50.732: ISAKMP:(0):atts are not acceptable. Next payload is 3
Jan 22 08:18:50.732: ISAKMP:(0):Checking ISAKMP transform 2 against priority 1 policy
Jan 22 08:18:50.732: ISAKMP: encryption AES-CBC
Jan 22 08:18:50.732: ISAKMP: hash MD5
Jan 22 08:18:50.732: ISAKMP: default group 5
Jan 22 08:18:50.732: ISAKMP: auth XAUTHInitRSA
Jan 22 08:18:50.732: ISAKMP: life type in seconds
Jan 22 08:18:50.732: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
Jan 22 08:18:50.732: ISAKMP: keylength of 256
etc. irrelevant raws was droped
Jan 22 08:18:50.752: ISAKMP:(0):Checking ISAKMP transform 19 against priority 3 policy
Jan 22 08:18:50.752: ISAKMP: encryption 3DES-CBC
Jan 22 08:18:50.752: ISAKMP: hash SHA
Jan 22 08:18:50.752: ISAKMP: default group 5
Jan 22 08:18:50.752: ISAKMP: auth RSA sig
Jan 22 08:18:50.752: ISAKMP: life type in seconds
Jan 22 08:18:50.752: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
Jan 22 08:18:50.752: ISAKMP:(0):Diffie-Hellman group offered does not match policy!
Jan 22 08:18:50.752: ISAKMP:(0):atts are not acceptable. Next payload is 3
Jan 22 08:18:50.752: ISAKMP:(0):Checking ISAKMP transform 20 against priority 3 policy
Jan 22 08:18:50.752: ISAKMP: encryption 3DES-CBC
Jan 22 08:18:50.752: ISAKMP: hash MD5
Jan 22 08:18:50.752: ISAKMP: default group 5
Jan 22 08:18:50.752: ISAKMP: auth RSA sig
Jan 22 08:18:50.752: ISAKMP: life type in seconds
Jan 22 08:18:50.752: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
Jan 22 08:18:50.752: ISAKMP:(0):Hash algorithm offered does not match policy!
Jan 22 08:18:50.752: ISAKMP:(0):atts are not acceptable. Next payload is 3
Jan 22 08:18:50.752: ISAKMP:(0):Checking ISAKMP transform 21 against priority 3 policy
Jan 22 08:18:50.752: ISAKMP: encryption 3DES-CBC
Jan 22 08:18:50.752: ISAKMP: hash SHA
Jan 22 08:18:50.752: ISAKMP: default group 2
Jan 22 08:18:50.752: ISAKMP: auth XAUTHInitRSA
Jan 22 08:18:50.752: ISAKMP: life type in seconds
Jan 22 08:18:50.752: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
Jan 22 08:18:50.752: ISAKMP:(0):atts are acceptable. Next payload is 3
Jan 22 08:18:50.756: ISAKMP:(0):Acceptable atts:actual life: 86400
Jan 22 08:18:50.756: ISAKMP:(0):Acceptable atts:life: 0
Jan 22 08:18:50.756: ISAKMP:(0):Fill atts in sa vpi_length:4
Jan 22 08:18:50.756: ISAKMP:(0):Fill atts in sa life_in_seconds:2147483
Jan 22 08:18:50.756: CRYPTO_PKI: Identity not specified for session 10001
Jan 22 08:18:50.756: ISAKMP:(0):Returning Actual lifetime: 86400
Jan 22 08:18:50.756: ISAKMP:(0)::Started lifetime timer: 86400.
Jan 22 08:18:50.780: ISAKMP:(0): vendor ID is NAT-T v2
Jan 22 08:18:50.780: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jan 22 08:18:50.780: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1
Jan 22 08:18:50.780: ISAKMP:(0): constructed NAT-T vendor-02 ID
Jan 22 08:18:50.780: ISAKMP:(0): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) MM_SA_SETUP
Jan 22 08:18:50.780: ISAKMP:(0):Sending an IKE IPv4 Packet.
Jan 22 08:18:50.780: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jan 22 08:18:51.592: ISAKMP (1001): No NAT Found for self or peer
Jan 22 08:18:51.592: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jan 22 08:18:51.592: ISAKMP:(1001):Old State = IKE_R_MM3 New State = IKE_R_MM3
Jan 22 08:18:51.592: ISAKMP (1001): constructing CERT_REQ for issuer cn=firm-cu,dc=firm,dc=local
Jan 22 08:18:51.596: ISAKMP:(1001): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) MM_KEY_EXCH
Jan 22 08:18:51.596: ISAKMP:(1001):Sending an IKE IPv4 Packet.
Jan 22 08:18:51.596: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jan 22 08:18:51.596: ISAKMP:(1001):Old State = IKE_R_MM3 New State = IKE_R_MM4
Jan 22 08:19:00.504: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:00.508: ISAKMP:(1001):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jan 22 08:19:00.508: ISAKMP:(1001):Old State = IKE_R_MM4 New State = IKE_R_MM5
Jan 22 08:19:00.508: ISAKMP:(1001): processing ID payload. message ID = 0
Jan 22 08:19:00.508: ISAKMP (1001): ID payload
next-payload : 6
type : 9
Dist. name : e=jarda@firm.com,cn=cisco-vpn1,ou=it,o=Firm Ltd.,l=Town,st=Discrict,c=State
protocol : 17
port : 500
length : 166
Jan 22 08:19:00.508: ISAKMP:(0):: UNITY's identity group: OU = it
Jan 22 08:19:00.508: ISAKMP:(0):: peer matches *none* of the profiles
Jan 22 08:19:00.508: ISAKMP:(1001): processing CERT payload. message ID = 0
Jan 22 08:19:00.508: ISAKMP:(1001): processing a CT_X509_SIGNATURE cert
Jan 22 08:19:00.512: CRYPTO_PKI: Added x509 peer certificate - (1447) bytes
Jan 22 08:19:00.512: ISAKMP:(1001): peer's pubkey isn't cached
Jan 22 08:19:00.512: CRYPTO_PKI: validation path has 1 certs
Jan 22 08:19:00.512: CRYPTO_PKI: Found a issuer match
Jan 22 08:19:00.512: CRYPTO_PKI: Using firm-cu to validate certificate
Jan 22 08:19:00.524: CRYPTO_PKI: Certificate validated without revocation check
Jan 22 08:19:00.524: CRYPTO_PKI: chain cert was anchored to trustpoint firm-cu, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING
Jan 22 08:19:00.524: CRYPTO_PKI: Validation TP is firm-cu
Jan 22 08:19:00.528: ISAKMP:(1001): OU = it
Jan 22 08:19:00.528: ISAKMP:(0):: UNITY's identity group: OU = it
Jan 22 08:19:00.528: ISAKMP:(0):: peer matches *none* of the profiles
Jan 22 08:19:00.528: ISAKMP:(1001): processing CERT_REQ payload. message ID = 0
Jan 22 08:19:00.528: ISAKMP:(1001): peer wants a CT_X509_SIGNATURE cert
Jan 22 08:19:00.528: ISAKMP:(1001): issuer not specified in cert request
Jan 22 08:19:00.528: ISAKMP:(1001): No issuer name in cert request.
Jan 22 08:19:00.528: ISAKMP:(1001): processing SIG payload. message ID = 0
Jan 22 08:19:00.532: ISAKMP:(1001): processing NOTIFY INITIAL_CONTACT protocol 1
spi 0, message ID = 0, sa = 0x47093EF0
Jan 22 08:19:00.532: ISAKMP:(1001):SA authentication status:
authenticated
Jan 22 08:19:00.532: ISAKMP:(1001):SA has been authenticated with 10.1.1.133
Jan 22 08:19:00.532: ISAKMP:(1001):SA authentication status:
authenticated
Jan 22 08:19:00.532: ISAKMP:(1001): Process initial contact,
bring down existing phase 1 and 2 SA's with local 10.1.1.220 remote 10.1.1.133 remote port 500
Jan 22 08:19:00.532: ISAKMP:(1001):returning IP addr to the address pool
Jan 22 08:19:00.536: ISAKMP: Trying to insert a peer 10.1.1.220/10.1.1.133/500/, and inserted successfully 47106BCC.
Jan 22 08:19:00.536: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jan 22 08:19:00.536: ISAKMP:(1001):Old State = IKE_R_MM5 New State = IKE_R_MM5
Jan 22 08:19:00.536: IPSEC(key_engine): got a queue event with 1 KMI message(s)
Jan 22 08:19:00.536: ISAKMP:(1001):Unable to get router cert or routerdoes not have a cert: needed to find DN!
Jan 22 08:19:00.536: ISAKMP:(1001):SA is doing RSA signature authentication plus XAUTH using id type ID_FQDN
Jan 22 08:19:00.536: ISAKMP (1001): ID payload
next-payload : 6
type : 2
FQDN name : cisco-ca.firm.com
protocol : 17
port : 500
length : 25
Jan 22 08:19:00.536: ISAKMP:(1001):Total payload length: 25
Jan 22 08:19:00.536: ISAKMP (1001): no cert chain to send to peer
Jan 22 08:19:00.536: ISAKMP (1001): peer did not specify issuer and no suitable profile found
Jan 22 08:19:00.536: ISAKMP (1001): FSM action returned error: 2
Jan 22 08:19:00.536: ISAKMP:(1001):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jan 22 08:19:00.536: ISAKMP:(1001):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE
Jan 22 08:19:05.652: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:05.652: ISAKMP:(1001): phase 1 packet is a duplicate of a previous packet.
Jan 22 08:19:05.652: ISAKMP:(1001): retransmitting due to retransmit phase 1
Jan 22 08:19:05.652: ISAKMP:(1001): no outgoing phase 1 packet to retransmit. MM_KEY_EXCH
Jan 22 08:19:10.652: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:10.652: ISAKMP:(1001): phase 1 packet is a duplicate of a previous packet.
Jan 22 08:19:10.652: ISAKMP:(1001): retransmitting due to retransmit phase 1
Jan 22 08:19:10.652: ISAKMP:(1001): no outgoing phase 1 packet to retransmit. MM_KEY_EXCH
Jan 22 08:19:15.652: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:15.652: ISAKMP:(1001): phase 1 packet is a duplicate of a previous packet.
Jan 22 08:19:15.652: ISAKMP:(1001): retransmitting due to retransmit phase 1
Jan 22 08:19:15.652: ISAKMP:(1001): no outgoing phase 1 packet to retransmit. MM_KEY_EXCH
Jan 22 08:19:20.677: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:20.677: ISAKMP: set new node 328239023 to CONF_XAUTH
Jan 22 08:19:20.677: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:20.677: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:20.677: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:20.677: ISAKMP (1001): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jan 22 08:19:20.677: ISAKMP: Info Notify message requeue retry counter exceeded sa request from 10.1.1.133 to 10.1.1.220.
Thank you very much for your time and cooperation.
Enjoy your weekend as well.
P.Sonenberk
01-24-2010 08:50 PM
Based on debug output, I think the problem shoult be here:
Jan 22 08:19:00.528: ISAKMP:(1001): peer wants a CT_X509_SIGNATURE cert
Jan 22 08:19:00.528: ISAKMP:(1001): issuer not specified in cert request
Jan 22 08:19:00.528: ISAKMP:(1001): No issuer name in cert request.
When client sends Cert request, it don't tell the issuer.
Are you using Cisco VPN client, if yes, please check log to see if you could find any error such as "not find root cert".
01-25-2010 05:46 AM
Good morning,
thank you for your advice.
I've used VPN Cisco client ver.4.6.02.0011 and WXP PC.
Yes, this raws of the log are suspicious, it's the truth:
Jan 22 08:19:00.528: ISAKMP:(1001): issuer not specified in cert request
Jan 22 08:19:00.528: ISAKMP:(1001): No issuer name in cert request.
But this ISAKM step ended with this messages:
Jan 22 08:19:00.532: ISAKMP:(1001):SA authentication status:
authenticated
Jan 22 08:19:00.532: ISAKMP:(1001):SA has been authenticated with 10.1.1.133
Jan 22 08:19:00.532: ISAKMP:(1001):SA authentication status:
authenticated
and I can see in Cisco router:
cisco-ca#sh crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
10.1.1.220 10.1.1.133 MM_KEY_EXCH 1002 ACTIVE
IPv6 Crypto ISAKMP SA
It's suspicious too.
Bye the way here is VPN Cisco client log:
Cisco Systems VPN Client Version 4.6.02.0011
Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
137 11:38:18.016 01/25/10 Sev=Info/4 CERT/0x63600013
Cert (e=jarda@firm.com,cn=cisco-vpn1,ou=it,o=Firm\ Ltd.,l=Town,st=Discrit,c=State verification succeeded.
138 11:38:18.016 01/25/10 Sev=Info/4 CM/0x63100002
Begin connection process
139 11:38:18.031 01/25/10 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
140 11:38:18.031 01/25/10 Sev=Info/4 CM/0x63100024
Attempt connection with server "10.1.1.220"
141 11:38:19.031 01/25/10 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 10.1.1.220.
142 11:38:19.203 01/25/10 Sev=Info/4 CERT/0x63600013
Cert (e=jarda@firm.com,cn=cisco-vpn1,ou=it,o=Firm\ Ltd.,l=Town,st=Discrit,c=State verification succeeded.
143 11:38:19.203 01/25/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM (SA, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to 10.1.1.220
144 11:38:19.234 01/25/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
145 11:38:19.234 01/25/10 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK MM (SA, VID(Nat-T)) from 10.1.1.220
146 11:38:19.250 01/25/10 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
147 11:38:19.250 01/25/10 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
148 11:38:19.250 01/25/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM (KE, NON, NAT-D, NAT-D, VID(?), VID(Unity)) to 10.1.1.220
149 11:38:20.062 01/25/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
150 11:38:20.062 01/25/10 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK MM (KE, NON, CERT_REQ, VID(Unity), VID(dpd), VID(?), VID(Xauth), NAT-D, NAT-D) from 10.1.1.220
151 11:38:20.062 01/25/10 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
152 11:38:20.062 01/25/10 Sev=Info/5 IKE/0x63000001
Peer supports DPD
153 11:38:20.062 01/25/10 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
154 11:38:20.062 01/25/10 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
155 11:38:20.453 01/25/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM *(ID, CERT, CERT_REQ, SIG, NOTIFY:STATUS_INITIAL_CONTACT) to 10.1.1.220
156 11:38:25.797 01/25/10 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
157 11:38:25.797 01/25/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM *(Retransmission) to 10.1.1.220
158 11:38:30.797 01/25/10 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
159 11:38:30.797 01/25/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM *(Retransmission) to 10.1.1.220
160 11:38:35.797 01/25/10 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
161 11:38:35.797 01/25/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM *(Retransmission) to 10.1.1.220
162 11:38:40.797 01/25/10 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=F599D0232153B7CD R_Cookie=66AFDB474742802E) reason = DEL_REASON_PEER_NOT_RESPONDING
163 11:38:40.797 01/25/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to 10.1.1.220
164 11:38:41.297 01/25/10 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=F599D0232153B7CD R_Cookie=66AFDB474742802E) reason = DEL_REASON_PEER_NOT_RESPONDING
165 11:38:41.297 01/25/10 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "10.1.1.220" because of "DEL_REASON_PEER_NOT_RESPONDING"
166 11:38:41.312 01/25/10 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
167 11:38:41.312 01/25/10 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
168 11:38:41.328 01/25/10 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
And what about this messages of the cisco log:
Jan 22 08:19:00.536: ISAKMP:(1001):Unable to get router cert or routerdoes not have a cert: needed to find DN!
Jan 22 08:19:00.536: ISAKMP:(1001):SA is doing RSA signature authentication plus XAUTH using id type ID_FQDN
Jan 22 08:19:00.536: ISAKMP (1001): ID payload
next-payload : 6
type : 2
FQDN name : cisco-ca.firm.com
protocol : 17
port : 500
length : 25
Jan 22 08:19:00.536: ISAKMP:(1001):Total payload length: 25
Jan 22 08:19:00.536: ISAKMP (1001): no cert chain to send to peer
Jan 22 08:19:00.536: ISAKMP (1001): peer did not specify issuer and no suitable profile found
I am afraid and I think there is something wrong in cisco router configuration...............
Thank you very much for your time and cooperation.
Have a nice day.
P.Sonenberk
01-25-2010 11:10 PM
Client did send its cert and the router also validated it successfully.
The problem is that router did not send its cert to client since there is no issuer specified in client's cert request.
http://cdetsweb-prd.cisco.com/apps/goto?identifier=CSCsc08040You can try a vpn client with fix of bug CSCsc08040 to see if it make any difference.
Per my understanding, Cisco VPN cliend should specified the issuer in its cert request. But other vendor's client might not do that.
Addmittedly, from router point of view, the router should still send a cert to client by using its existing cert even if there is no issuer specified in client's cert request. (There was a bug about this behavior and it should be fixed in your IOS version 12.4(6)). So, regarding to the configuration, I believe that you can try to configure "isakmp profile" (you can specify trustpoint in profile, you might need to configure a map as well, sorry I don't remember exactly syntax ).
The third thing is a bug on router side.
this bug is not a exactly match but it might be related. It won't hurt to try a IOS version with the fix of this bug.
01-27-2010 02:50 AM
Good morning,
it seems to be a little complicated.........
Well, client certiface has information about "issuer" in.
Report of our client certificate is here:
Certificate data
Serial number 61 3c 42 d1 00 01 00 00 00 0f
Issued to cisco-vpn1
Issued by firm-cu
Valid from 01/12/2010
Valid to 01/12/2011
Intended purposes Client Authentication
Private key Data:
Key Size 1024 bits
Container name 5b1caef5......
Modulus b0 be 93 7c ............
Key specification AT-KEYEXHCANGE
I don't know why there is this error messages in Cisco router logs:
Jan 22 08:19:00.528: ISAKMP:(1001): issuer not specified in cert request
Jan 22 08:19:00.528: ISAKMP:(1001): No issuer name in cert request.
I'm sorry, but this URL: http://cdetsweb-prd.cisco.com/apps/goto?identifier=CSCsc08040 is
unavailable - time out for connection ............
>>Addmittedly, from router point of view, the router should still send a cert to client by using its existing cert even if there is no issuer specified in client's cert request.
I agree with you, but there is this error messages in Cisco router logs:
Jan 22 08:19:00.536: ISAKMP:(1001):Unable to get router cert or routerdoes not have a cert: needed to find DN!
Jan 22 08:19:00.536: ISAKMP:(1001):SA is doing RSA signature authentication plus XAUTH using id type ID_FQDN
Jan 22 08:19:00.536: ISAKMP (1001): ID payload
next-payload : 6
type : 2
FQDN name : cisco-ca.firm.com
protocol : 17
port : 500
length : 25
Jan 22 08:19:00.536: ISAKMP:(1001):Total payload length: 25
Jan 22 08:19:00.536: ISAKMP (1001): no cert chain to send to peer
Jan 22 08:19:00.536: ISAKMP (1001): peer did not specify issuer and no suitable profile found
Reports of certificates in Cisco router are above.
---> cisco-ca#sh crypto ca certificate
---> cisco-ca#sh crypto ca trustpoints status
---> cisco-ca#sh crypto key pubkey-chain rsa
Fine, isakmp configuration, there could be some mistake......
Does somebody know what mistake? Does anyone have a solution to fix this problem?
Thank you for your cooperation.
Have a nice day.
P.Sonenberk
01-27-2010 09:23 AM
Hey guys, It is odd that the router is not finding the cert after the IKE matches the cert and validates it, I this certainly is not right, however I would go ahead and configure certificate mapping on this router to force the client to be matched to a specific IKE group, for that matter you will need to change your config a little bit to use iskamp profiles:
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t8/feature/guide/gt_isakp.html
02-03-2010 12:03 AM
Dear Mr. Martinon,
GREAT! "Certificate to ISAKMP Profile Mapping" is solution.
I added this raws to Cisco router configuration:
!
crypto pki certificate map cert_map 10
subject-name co ou=it
!
and raws
!
crypto isakmp profile certpro
ca trust-point firm-cu
match certificate cert_map
!
And now is authentication between Cisco VPN client and Cisco 2821 all right.
Cisco VPN client is working well.
(Note: Cisco VPN client has its certificate in eToken PRO Aladdin.)
It's a pity and a little confusing that Cisco configuration examples hasn't notice
about this problem ................
Well, there are still some strange messages in logs, but it's for some
"Cisco guru". For example:
*Feb 2 09:55:19.388: ISAKMP (1002): processing a CT_PKCS7_WRAPPED_X509 cert
*Feb 2 09:55:19.388: ../cert-c/source/certobj.c(853) : E_INPUT_DATA : invalid encoding format for input data
*Feb 2 09:55:19.388: CRYPTO_PKI: status = 0x705(E_INPUT_DATA : invalid encoding format for input data): BER/DER decoding of certificate has failed
*Feb 2 09:55:19.452: ISAKMP:(1002): peer wants a CT_X509_SIGNATURE cert
*Feb 2 09:55:19.452: ISAKMP:(1002): issuer not specified in cert request
*Feb 2 09:55:19.452: ISAKMP:(1002): No issuer name in cert request.
*Feb 2 09:55:19.452: CRYPTO_PKI: Trust-Point firm-cu picked up
etc.
For hardworking readers the main part of the Cisco router logs are below.
Mr. Martinon, thank you for you help and your time.
Thank you for your cooperation.
Have a nice day.
P.Sonenberk
--------------------------------------
*Feb 2 09:55:18.620: ISAKMP (1002): constructing CERT_REQ for issuer cn=firm-cu,dc=firm,dc=local
*Feb 2 09:55:18.620: ISAKMP:(1002): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) MM_KEY_EXCH
*Feb 2 09:55:18.620: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Feb 2 09:55:18.620: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Feb 2 09:55:18.620: ISAKMP:(1002):Old State = IKE_R_MM3 New State = IKE_R_MM4
*Feb 2 09:55:19.380: ISAKMP (1002): received packet from 10.1.1.133 dport 500 sport 500 Global (R) MM_KEY_EXCH
*Feb 2 09:55:19.384: ISAKMP:(1002):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Feb 2 09:55:19.384: ISAKMP:(1002):Old State = IKE_R_MM4 New State = IKE_R_MM5
*Feb 2 09:55:19.384: ISAKMP:(1002): processing ID payload. message ID = 0
*Feb 2 09:55:19.384: ISAKMP (1002): ID payload
next-payload : 6
type : 9
Dist. name : e=jarda@firm.com,cn=cisco-vpn1,ou=it,o=Firm Ltd.,l=Town,st=Discrict,c=State
protocol : 17
port : 500
length : 166
*Feb 2 09:55:19.384: ISAKMP:(0):: UNITY's identity group: OU = it
*Feb 2 09:55:19.384: ISAKMP:(0):: peer matches *none* of the profiles
*Feb 2 09:55:19.384: ISAKMP:(1002): processing CERT payload. message ID = 0
*Feb 2 09:55:19.388: ISAKMP (1002): processing a CT_PKCS7_WRAPPED_X509 cert
*Feb 2 09:55:19.388: ../cert-c/source/certobj.c(853) : E_INPUT_DATA : invalid encoding format for input data
*Feb 2 09:55:19.388: CRYPTO_PKI: status = 0x705(E_INPUT_DATA : invalid encoding format for input data): BER/DER decoding of certificate has failed
*Feb 2 09:55:19.396: CRYPTO_PKI: Added x509 peer certificate - (1165) bytes
*Feb 2 09:55:19.400: CRYPTO_PKI: Added x509 peer certificate - (1447) bytes
*Feb 2 09:55:19.404: ISAKMP:(1002): peer's pubkey is cached
*Feb 2 09:55:19.404: CRYPTO_PKI: validation path has 1 certs
*Feb 2 09:55:19.404: CRYPTO_PKI: Found a issuer match
*Feb 2 09:55:19.404: CRYPTO_PKI: Using firm-cu to validate certificate
*Feb 2 09:55:19.416: CRYPTO_PKI: Certificate validated without revocation check
*Feb 2 09:55:19.416: CRYPTO_PKI: chain cert was anchored to trustpoint firm-cu, and chain validation result was: CRYPTO_VALID_CERT_WITH_WARNING
*Feb 2 09:55:19.416: CRYPTO_PKI: Validation TP is firm-cu
*Feb 2 09:55:19.448: ISAKMP:(1002): OU = it
*Feb 2 09:55:19.452: ISAKMP:(0): certificate map matches certpro profile
*Feb 2 09:55:19.452: ISAKMP:(0): Trying to re-validate CERT using new profile
*Feb 2 09:55:19.452: ISAKMP:(0): Creating CERT validation list: firm-cu,
*Feb 2 09:55:19.452: ISAKMP:(0): CERT validity confirmed.
*Feb 2 09:55:19.452: ISAKMP:(1002):Profile has no keyring, aborting key search
*Feb 2 09:55:19.452: ISAKMP:(1002): processing CERT_REQ payload. message ID = 0
*Feb 2 09:55:19.452: ISAKMP:(1002): peer wants a CT_X509_SIGNATURE cert
*Feb 2 09:55:19.452: ISAKMP:(1002): issuer not specified in cert request
*Feb 2 09:55:19.452: ISAKMP:(1002): No issuer name in cert request.
*Feb 2 09:55:19.452: CRYPTO_PKI: Trust-Point firm-cu picked up
*Feb 2 09:55:19.452: CRYPTO_PKI: 1 matching trustpoints found
*Feb 2 09:55:19.452: ISAKMP: Examining profile list for trustpoint firm-cu
*Feb 2 09:55:19.452: ISAKMP: Found matching profile for firm-cu
*Feb 2 09:55:19.452: CRYPTO_PKI: Identity selected (firm-cu) for session 20004
*Feb 2 09:55:19.452: Choosing trustpoint firm-cu as issuer
*Feb 2 09:55:19.452: CRYPTO_PKI: unlocked trustpoint firm-cu, refcount is 0
*Feb 2 09:55:19.452: CRYPTO_PKI: locked trustpoint firm-cu, refcount is 1
*Feb 2 09:55:19.452: CRYPTO_PKI: Identity bound (firm-cu) for session 10003
*Feb 2 09:55:19.452: ISAKMP (1002): sending peer cert issued by cn=firm-cu,dc=firm,dc=local
*Feb 2 09:55:19.452: ISAKMP:(1002): processing SIG payload. message ID = 0
*Feb 2 09:55:19.456: ISAKMP:(1002): processing NOTIFY INITIAL_CONTACT protocol 1
spi 0, message ID = 0, sa = 0x458A0FAC
*Feb 2 09:55:19.456: ISAKMP:(1002):SA authentication status:
authenticated
*Feb 2 09:55:19.456: ISAKMP:(1002):SA has been authenticated with 10.1.1.133
*Feb 2 09:55:19.456: ISAKMP:(1002):SA authentication status:
authenticated
*Feb 2 09:55:19.456: ISAKMP:(1002): Process initial contact,
bring down existing phase 1 and 2 SA's with local 10.1.1.220 remote 10.1.1.133 remote port 500
*Feb 2 09:55:19.456: ISAKMP:(1002):returning IP addr to the address pool
*Feb 2 09:55:19.460: ISAKMP: Trying to insert a peer 10.1.1.220/10.1.1.133/500/, and inserted successfully 470A2A70.
*Feb 2 09:55:19.460: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Feb 2 09:55:19.460: ISAKMP:(1002):Old State = IKE_R_MM5 New State = IKE_R_MM5
*Feb 2 09:55:19.476: ISAKMP:(1002):SA is doing RSA signature authentication plus XAUTH using id type ID_FQDN
*Feb 2 09:55:19.476: ISAKMP (1002): ID payload
next-payload : 6
type : 2
FQDN name : cisco-ca.firm.com
protocol : 17
port : 500
length : 25
*Feb 2 09:55:19.476: ISAKMP:(1002):Total payload length: 25
*Feb 2 09:55:19.492: ISAKMP (1002): constructing CERT payload for hostname=cisco-ca.firm.com
*Feb 2 09:55:19.492: ISKAMP: growing send buffer from 1024 to 3072
*Feb 2 09:55:19.492: ISAKMP:(1002): using the firm-cu trustpoint's keypair to sign
*Feb 2 09:55:19.520: ISAKMP:(1002): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) MM_KEY_EXCH
*Feb 2 09:55:19.520: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Feb 2 09:55:19.520: ISAKMP:(1002):Returning Actual lifetime: 86400
*Feb 2 09:55:19.520: ISAKMP: set new node 586373909 to CONF_XAUTH
*Feb 2 09:55:19.524: ISAKMP:(1002):Sending NOTIFY RESPONDER_LIFETIME protocol 1
spi 1188832080, message ID = 586373909
*Feb 2 09:55:19.524: ISAKMP:(1002): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) MM_KEY_EXCH
*Feb 2 09:55:19.524: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Feb 2 09:55:19.524: ISAKMP:(1002):purging node 586373909
*Feb 2 09:55:19.524: ISAKMP: Sending phase 1 responder lifetime 86400
*Feb 2 09:55:19.524: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Feb 2 09:55:19.524: ISAKMP:(1002):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE
*Feb 2 09:55:19.524: ISAKMP:(1002):Need XAUTH
*Feb 2 09:55:19.524: ISAKMP: set new node 1502050166 to CONF_XAUTH
*Feb 2 09:55:19.524: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2
*Feb 2 09:55:19.524: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2
*Feb 2 09:55:19.524: ISAKMP:(1002): initiating peer config to 10.1.1.133. ID = 1502050166
*Feb 2 09:55:19.524: ISAKMP:(1002): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) CONF_XAUTH
*Feb 2 09:55:19.524: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Feb 2 09:55:19.524: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Feb 2 09:55:19.524: ISAKMP:(1002):Old State = IKE_P1_COMPLETE New State = IKE_XAUTH_REQ_SENT
*Feb 2 09:55:24.524: ISAKMP:(1002): retransmitting phase 2 CONF_XAUTH 1502050166 ...
*Feb 2 09:55:24.524: ISAKMP (1002): incrementing error counter on node, attempt 1 of 5: retransmit phase 2
*Feb 2 09:55:24.524: ISAKMP (1002): incrementing error counter on sa, attempt 1 of 5: retransmit phase 2
*Feb 2 09:55:24.524: ISAKMP:(1002): retransmitting phase 2 1502050166 CONF_XAUTH
*Feb 2 09:55:24.524: ISAKMP:(1002): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) CONF_XAUTH
*Feb 2 09:55:24.524: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Feb 2 09:55:35.540: ISAKMP (1002): received packet from 10.1.1.133 dport 500 sport 500 Global (R) CONF_XAUTH
*Feb 2 09:55:35.540: ISAKMP:(1002):processing transaction payload from 10.1.1.133. message ID = 1502050166
*Feb 2 09:55:35.540: ISAKMP: Config payload REPLY
*Feb 2 09:55:35.540: ISAKMP/xauth: reply attribute XAUTH_USER_NAME_V2
*Feb 2 09:55:35.540: ISAKMP/xauth: reply attribute XAUTH_USER_PASSWORD_V2
*Feb 2 09:55:35.540: ISAKMP:(1002):deleting node 1502050166 error FALSE reason "Done with xauth request/reply exchange"
*Feb 2 09:55:35.540: ISAKMP:(1002):Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY
*Feb 2 09:55:35.540: ISAKMP:(1002):Old State = IKE_XAUTH_REQ_SENT New State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT
*Feb 2 09:55:35.540: ISAKMP: set new node 924775980 to CONF_XAUTH
*Feb 2 09:55:35.540: ISAKMP:(1002): initiating peer config to 10.1.1.133. ID = 924775980
*Feb 2 09:55:35.540: ISAKMP:(1002): sending packet to 10.1.1.133 my_port 500 peer_port 500 (R) CONF_XAUTH
*Feb 2 09:55:35.540: ISAKMP:(1002):Sending an IKE IPv4 Packet.
*Feb 2 09:55:35.544: ISAKMP:(1002):Input = IKE_MESG_FROM_AAA, IKE_AAA_CONT_LOGIN
*Feb 2 09:55:35.544: ISAKMP:(1002):Old State = IKE_XAUTH_AAA_CONT_LOGIN_AWAIT New State = IKE_XAUTH_SET_SENT
*Feb 2 09:55:35.544: ISAKMP (1002): received packet from 10.1.1.133 dport 500 sport 500 Global (R) CONF_XAUTH
*Feb 2 09:55:35.544: ISAKMP:(1002):processing transaction payload from 10.1.1.133. message ID = 924775980
*Feb 2 09:55:35.544: ISAKMP: Config payload ACK
*Feb 2 09:55:35.544: ISAKMP:(1002): (blank) XAUTH ACK Processed
*Feb 2 09:55:35.544: ISAKMP:(1002):deleting node 924775980 error FALSE reason "Transaction mode done"
*Feb 2 09:55:35.544: ISAKMP:(1002):Talking to a Unity Client
*Feb 2 09:55:35.544: ISAKMP:(1002):Input = IKE_MESG_FROM_PEER, IKE_CFG_ACK
*Feb 2 09:55:35.544: ISAKMP:(1002):Old State = IKE_XAUTH_SET_SENT New State = IKE_P1_COMPLETE
*Feb 2 09:55:35.548: CRYPTO_PKI: unlocked trustpoint firm-cu, refcount is 0
*Feb 2 09:55:35.548: ISAKMP:(1002):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Feb 2 09:55:35.548: ISAKMP:(1002):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Feb 2 09:55:35.564: ISAKMP (1002): received packet from 10.1.1.133 dport 500 sport 500 Global (R) QM_IDLE
*Feb 2 09:55:35.564: ISAKMP: set new node 269007336 to QM_IDLE
*Feb 2 09:55:35.564: ISAKMP:(1002):processing transaction payload from 10.1.1.133. message ID = 269007336
*Feb 2 09:55:35.564: ISAKMP: Config payload REQUEST
*Feb 2 09:55:35.564: ISAKMP:(1002):checking request:
*Feb 2 09:55:35.564: ISAKMP: IP4_ADDRESS
*Feb 2 09:55:35.564: ISAKMP: IP4_NETMASK
*Feb 2 09:55:35.564: ISAKMP: IP4_DNS
*Feb 2 09:55:35.564: ISAKMP: IP4_NBNS
etc.
02-03-2010 07:49 AM
Hi Peter,
I am glad this worked for you, does this mean that your client connects fine already? Logs show something else..
02-04-2010 02:06 AM
Hi Ivan,
>Logs show something else..
What do you mean?
Cisco VPN client got IP address form Cisco router and connection was
opened. I can see IP address (192.168.200.1) from Cisco in WXP (PC with VPN client) route table
and I can do login to Cisco router as its user. Cisco VPN client displays "a shut lock".
By the way there is log from Cisco VPN client (main part) below.
Cisco has IP address 10.1.1.220, client has IP address 10.1.1.133.
Important raws are:
26 10:55:38.312 02/02/10 Sev=Info/4 CERT/0x63600013
Cert (1.2.840.113549.1.9.2=#1311636973636f2d63612e6d6f706f732e637a) verification succeeded.
77 10:56:02.750 02/02/10 Sev=Info/4 CM/0x6310001A
One secure connection established
Thank you very much for your cooperation.
Have a nice day.
P.Sonenberk
--------------------------------------
12 10:55:25.000 02/02/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM (KE, NON, NAT-D, NAT-D, VID(?), VID(Unity)) to 10.1.1.220
13 10:55:25.828 02/02/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
14 10:55:25.828 02/02/10 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK MM (KE, NON, CERT_REQ, VID(Unity), VID(dpd), VID(?), VID(Xauth), NAT-D, NAT-D) from 10.1.1.220
15 10:55:25.828 02/02/10 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
16 10:55:25.828 02/02/10 Sev=Info/5 IKE/0x63000001
Peer supports DPD
17 10:55:25.828 02/02/10 Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
18 10:55:25.828 02/02/10 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
19 10:55:38.000 02/02/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM *(ID, CERT, CERT_REQ, SIG, NOTIFY:STATUS_INITIAL_CONTACT) to 10.1.1.220
20 10:55:38.000 02/02/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
21 10:55:38.000 02/02/10 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK MM (Retransmission) from 10.1.1.220
22 10:55:38.000 02/02/10 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
23 10:55:38.000 02/02/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK MM *(Retransmission) to 10.1.1.220
24 10:55:38.187 02/02/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
25 10:55:38.187 02/02/10 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK MM *(ID, CERT, SIG) from 10.1.1.220
26 10:55:38.312 02/02/10 Sev=Info/4 CERT/0x63600013
Cert (1.2.840.113549.1.9.2=#1311636973636f2d63612e6d6f706f732e637a) verification succeeded.
27 10:55:38.312 02/02/10 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x01F4, Remote Port = 0x01F4
28 10:55:38.312 02/02/10 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end is NOT behind a NAT device
29 10:55:38.312 02/02/10 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
30 10:55:38.312 02/02/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
etc.
52 10:55:56.921 02/02/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
53 10:55:56.921 02/02/10 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 10.1.1.220
54 10:55:56.921 02/02/10 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 192.168.200.1
55 10:55:56.921 02/02/10 Sev=Info/5 IKE/0xA3000017
MODE_CFG_REPLY: The received (INTERNAL_ADDRESS_EXPIRY) attribute and value (-1062680575) is not supported
56 10:55:56.921 02/02/10 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SAVEPWD: , value = 0x00000000
57 10:55:56.921 02/02/10 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = firm.com
58 10:55:56.921 02/02/10 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000001
59 10:55:56.921 02/02/10 Sev=Info/5 IKE/0x6300000F
SPLIT_NET #1
subnet = 192.168.201.0
mask = 255.255.255.0
protocol = 0
src port = 0
dest port=0
etc.
63 10:55:56.937 02/02/10 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 192.168.200.1, GW IP = 10.1.1.220, Remote IP = 0.0.0.0
64 10:55:56.937 02/02/10 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 10.1.1.220
65 10:55:56.953 02/02/10 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 10.1.1.220
etc.
73 10:56:02.562 02/02/10 Sev=Info/4 CM/0x63100034
The Virtual Adapter was enabled:
IP=192.168.200.1/255.255.255.0
DNS=0.0.0.0,0.0.0.0
WINS=0.0.0.0,0.0.0.0
Domain=firm.com
Split DNS Names=
74 10:56:02.562 02/02/10 Sev=Warning/2 CVPND/0xE3400013
AddRoute failed to add a route: code 87
Destination 127.0.0.1
Netmask 255.255.255.255
Gateway 10.1.1.1
Interface 10.1.1.133
75 10:56:02.562 02/02/10 Sev=Warning/3 CM/0xA3100023
Failed to add route to the dhcp server.
76 10:56:02.562 02/02/10 Sev=Info/6 CM/0x63100036
The routing table was updated for the Virtual Adapter
77 10:56:02.750 02/02/10 Sev=Info/4 CM/0x6310001A
One secure connection established
78 10:56:03.000 02/02/10 Sev=Info/4 CM/0x63100038
Address watch added for 10.1.1.133. Current hostname: Jarda-servis, Current address(es): 192.168.200.1, 10.1.1.133.
79 10:56:03.000 02/02/10 Sev=Info/4 CM/0x63100038
Address watch added for 192.168.200.1. Current hostname: Jarda-servis, Current address(es): 192.168.200.1, 10.1.1.133.
02-04-2010 08:20 AM
Oh, OK, great to hear, I was concerned by the following message:
*Feb 2 09:55:35.540: ISAKMP:(1002):deleting node 1502050166 error FALSE reason "Done with xauth request/reply exchange"
But if it is all good then glad it works now.
02-04-2010 08:20 AM
Please rate useful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide