06-16-2022 06:39 AM
Hi guys, hoping someone might have some pointers.
I'm tryng to set up an IKEv2 vpn but going round in circles.
I have a number of IKEv1 vpn's connected using crypto maps on our external interface. I've been told that the most recent config advice would be to use VTI's, however we aren't able to create a VTI as we would need to remove the crypto maps of the existing connections. We should be able to use IKEv2 in the current setup using crypto map to route through the existing external interface.
I'm running:
Cisco IOS XE Software, Version 03.10.02.S - Extended Support Release
Cisco IOS Software, ASR1000 Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.3(3)S2, RELEASE SOFTWARE (fc3)
Config applied:
Solved! Go to Solution.
06-17-2022 03:08 AM
@bbqbruce looking into the logs seem like it could be both side some how not liking the phase2 with esp-aes 256 could you change them both side to esp-sha-hmac
and test it please.
06-16-2022 07:04 AM
could you confirm if the remote side is configured with same parameter in regards to ipsec phase2.
06-16-2022 07:19 AM
Yes, the remote side is an azure vwan, it doesn't look to have too much configuration to play with:
Traffic Selector Config:
Local address range: site2smppip/29
remote address range: site1smppip/32
IKEV2
Use Policy based traffic selector: Enabled
SA Lifetime: 28800
IKE Phase1: AES256/SHA256/DH14
IKE Phase2: AES256/SHA256/PFS14
06-16-2022 07:52 AM
could you try taking off DH14 on both sites
crypto map CMAP 246 ipsec-isakmp set peer site2vpnip set transform-set Transform-Set-5 no set pfs group14
for phase 2 only. leave for phase 1.
06-17-2022 01:14 AM
No joy, still the same errors with:
crypto map CMAP 246 ipsec-isakmp set peer site2vpnip set transform-set Transform-Set-5
We aren't able to use DH5 as site 2 doesn't support it.
Options on site 2 are:
Encryption
AES128
AES256
GCMAES128
GCMAES256
Integrity
GCMAES128
GCMAES256
SHA256
PFSGroup
ECP256
ECP384
PFS14
PFS24
None
06-17-2022 02:07 AM
could you please setup these commands and show us the output please.
debug crypto condition peer ipv4 X.X.X.X debug crypto ikev2 debug crypto ipsec
Take this off they not used any where
crypto ipsec profile ikev2-setup set transform-set Transform-Set-5 set pfs group14 set ikev2-profile ikev2-setup-profile responder-only
06-17-2022 02:27 AM
Thanks, ipsec profile removed.
Debugs are on:
IOSXE Conditional Debug Configs:
Conditional Debug Global State: Start
IOSXE Packet Tracing Configs:
UDP:
UDP packet debugging is on
Cryptographic Subsystem:
Crypto ISAKMP debugging is on
Crypto ISAKMP Error debugging is on
Crypto IPSEC debugging is on
Crypto IPSEC Error debugging is on
Crypto IPSEC states debugging is on
Crypto IPSEC message debugging is on
Crypto Key Management Interface debugging is on
Crypto Engine debugging is on
Crypto Engine Error debugging is on
IKEV2:
IKEv2 error debugging is on
IKEv2 default debugging is on
Conditional debug is on for the peer:
show crypto debug-condition
Crypto conditional debug currently is turned ON
IKE debug context unmatched flag: OFF
IKEV2 debug context unmatched flag: OFF
IPsec debug context unmatched flag: OFF
Crypto Engine debug context unmatched flag: OFF
IKE peer IP address filters:
site1vpnip
*******************************
A full exchange in the logs is:
06-17-2022 03:08 AM
@bbqbruce looking into the logs seem like it could be both side some how not liking the phase2 with esp-aes 256 could you change them both side to esp-sha-hmac
and test it please.
06-17-2022 04:01 AM
I've created a new transform set which is the lowest acceptable by the initiator with PFS None.:
crypto ipsec transform-set Transform-Set-10 esp-aes esp-sha256-hmac
mode tunnel
But error logs are still showingthe same.
Is there a link to where I can double check that these features are available on this OS?
I have also created:
crypto ipsec transform-set Transform-Set-11 esp-gcm
mode tunnel
And will see what shows in the logs.
06-17-2022 04:17 AM
Hi mate I asked to change them to phase2 with esp-aes 256 into esp-sha-hmac
crypto ipsec transform-set TSET esp-aes 256 esp-sha-hmac
or
crypto ipsec transform-set TSET esp-aes 128 esp-sha-hmac
where as you change this to
"crypto ipsec transform-set Transform-Set-10 esp-aes esp-sha256-hmac"
have a look at this Link kind of similar issue the one you having.
06-17-2022 05:54 AM - edited 06-17-2022 05:03 PM
please find below my comment
06-17-2022 06:53 AM
Thanks, we have dual vpn peers in active/standby. Connection to the VIP allows for automatic failover without intervention on the other end.
Active:
06-17-2022 07:28 AM - edited 06-17-2022 05:03 PM
pelase find below my comment
06-17-2022 08:05 AM
Thanks, site2vpnip is the public vip.
The initiator shouldnt be aware of the the public ip range of the interfaces on the 2 separate boxes. Their config will be from their VPN peer IP to our VPN peer VIP.
I'm also looking at debugging their IKEv1 connection - i will post something separately, I'm hoping it might be easier to get that working
06-17-2022 08:28 AM
Your phase 1 come up. so there is no issue with HSRP.
In the debug we can see even the control plane connection is there before vpn-tunnel tear it down.
what you can do is to setup the "monitor session" and capture the packets and off load to your computer and see it wireshark. As in your logs we cant see the Payload contents:
IDi AUTH SA TSi TSr
Are your PSK key are correct? have to change the PSK key on both end?
basically in your logs the your ASR is the VPN initiator. IInitiator SPI : D179FA2A903352F1 - Responder SPI : 0000000000000000 Message id: 0 Initiator SPI : D179FA2A903352F1 - Responder SPI : 395184BD8BAD0E14 Message id: 0 IKEv2 IKE_SA_INIT Exchange RESPONSE Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Completed SA init exchange IKEv2 IKE_AUTH Exchange REQUEST IKEv2 IKE_AUTH Exchange RESPONSE Jun 17 10:24:04: IKEv2:(SESSION ID = 628638,SA ID = 1):Processing ACK to informational exchange IKEv2 INFORMATIONAL Exchange REQUEST
Crypto IKEv2 sending message KEY_MGR_CREATE_IPSEC_SAS to IPSEC key engine. Jun 17 10:24:04: KMI: IPSEC key engine received message KEY_MGR_CREATE_IPSEC_SAS from Crypto IKEv2. Jun 17 10:24:04: IPSEC:(SESSION ID = 628638) (STATES) SADB_ROOT_SM (sadb_root_process_kmi_message) called static seqno 246 dynamic seqno 0 Jun 17 10:24:04: IPSEC:(SESSION ID = 628638) (get_old_outbound_sa_for_peer) No outbound SA found for peer 7FC0717E5748 Jun 17 10:24:04: IPSEC:(SESSION ID = 628638) (update_current_outbound_sa) updated peer site1vpnip current outbound sa to SPI 0 Jun 17 10:24:04: IPSEC(send_delete_notify_kmi): ASSERT FAILED: Decrement count mismatch for sibling :7FC066EF2638
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide