01-17-2019 01:09 AM
Hi,
I'm trying to understand why on 1 of my policy based (crypto map) IKEv2 IPSec the IKEv2 SA's are not expiring and are going way over their lifetime; Which caused new SAs to generate and thus I am seeing a whole bunch of SAs while the old ones are still active. Even after I manually clear the SAs they still stay up.
Does any one know how and why this is happening and how can I fix this behaviour?
PS: I am using a Cisco ASR1001 but am unsure of the remote side.
ACTIVE ONE:
Tunnel-id Local Remote fvrf/ivrf Status
60 1.1.1.1/500 2.2.2.2/500 FVRF/IVRF READY
Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:5, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 36000/7621 sec ------ (Active time is lower than Lifetime as expected)
ALL MANUALLY DELETED ONES THAT ARE STILL ACTIVE: As you can see the Active time has way surpassed Lifetime. And I have manually deleted the SAs using "clear crypto ikev2 sa" but they still show up here.
Tunnel-id Local Remote fvrf/ivrf Status
42 1.1.1.1/500 2.2.2.2/500 FVRF/IVRF DELETE
Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:5, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 36000/457740 sec
Tunnel-id Local Remote fvrf/ivrf Status
40 1.1.1.1/500 2.2.2.2/500 FVRF/IVRF DELETE
Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:5, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 36000/493743 sec
Tunnel-id Local Remote fvrf/ivrf Status
39 1.1.1.1/500 2.2.2.2/500 FVRF/IVRF DELETE
Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:5, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 36000/529759 sec
Tunnel-id Local Remote fvrf/ivrf Status
34 1.1.1.1/500 2.2.2.2/500 FVRF/IVRF DELETE
Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:5, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 36000/565760 sec
THUS Showing a whole lot of IPSec Phase2 SAs:
Router#show crypto session brief
Status: A- Active, U - Up, D - Down, I - Idle, S - Standby, N - Negotiating
K - No IKE
ivrf = IVRF
Peer I/F Group/Phase1_id Uptime Status
2.2.2.2 gig1 /1 2.2.2.2 1w4d UA
2.2.2.2 gig1/1 2.2.2.2 1w5d UA
2.2.2.2 gig1/1 2.2.2.2 6d23h UA
2.2.2.2 gig1/1 2.2.2.2 1w3d UA
2.2.2.2 gig1/1 2.2.2.2 1d03h UA
Kind regards
Solved! Go to Solution.
01-17-2019 03:52 AM - edited 01-17-2019 03:54 AM
Agree it most likely to be a bug. If you have a support/smart contract open and case with TAC. it would advise you which IOS is best to upgrade on your router.
found this bug similar to your router family CSCua10556
01-17-2019 01:23 AM - edited 01-17-2019 01:29 AM
have a look on this document you will find your answer.
also take in account that your peer router/fiewall have the same time setting. it could be your routers want to clear the SA but other site is not in the same time clock to clear it.
01-17-2019 01:30 AM
01-17-2019 02:34 AM
Thanks @Sheraz.Salim and @Rob Ingram for the response.
@Sheraz.Salim: I have read through this doc and it also states that once rekeying of a new SA is done after a while both parties stop sending traffic over the old SA and start using the new; which is what I would expect. The doc also says that even if no Delete SA message is received from the remote peer, it uses a timer to expire the SA. But in my case the old SAs never expire.
Well the remote router is in a +1hr GMT zone but why would that make any difference. Also if you have a look at the Phase 2 SA stats I posted, multiple of those SAs have been up for over a week.
@Rob IngramYes DPD is configured as "dpd 60 5 periodic" and I am on IOS XE Version 03.13.10.S
01-17-2019 02:36 AM
01-17-2019 02:35 AM
01-17-2019 03:01 AM
Yeah it could be a bug. I will try and raise it with cisco TAC and see if they confirm.
The SA status is indeed saying delete because I manually cleared the IKEv2 SA but they never actually expire. same goes for IPSec SA i.e. P2.
Kind regards
01-17-2019 03:52 AM - edited 01-17-2019 03:54 AM
Agree it most likely to be a bug. If you have a support/smart contract open and case with TAC. it would advise you which IOS is best to upgrade on your router.
found this bug similar to your router family CSCua10556
01-17-2019 06:19 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide