cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1957
Views
0
Helpful
4
Replies

IPSec multi vrf not working

MysticalTh0r
Level 1
Level 1

Hi all,

 

I'd like some help with an scenario I've got. I have two routers ASR 1K which have a VRF on the LAN interface and another VRF on the WAN interface. By configuring route-leaking I can ping from LAN to LAN and works fine. The problem arrises when I try to establish an IPSec session between them. 

I create keyrings and profiles associated to the LAN interfaces but I have to apply the crypto map to the WAN interfaces and doing so IKE phase 1 doesn't find the profile. If, on the other hand, I associate the keyrings and profiles to the WAN VRF, it negotiates fine IKE phase 1 but not phase 2.

 

Is it a software limitation or I might be due to a bug? Any ideas on how to configure it?

Here are the error messages

 

ISAKMP-ERROR: (0):Preshared authentication offered but does not match policy!
ISAKMP-ERROR: (0):atts are not acceptable. Next payload is 0
ISAKMP-ERROR: (0):no offers accepted!
ISAKMP-ERROR: (0):phase 1 SA policy not acceptable!

 

Thanks,

 

Best regards.

4 Replies 4

Hi, Please can you post your sanitised configuration

Sure, here is the configuration:

 

crypto keyring customer vrf vrf-LAN
pre-shared-key address 0.0.0.0 0.0.0.0 key customer  (here we tested also with the exact ip address too)
crypto isakmp policy 10
encr 3des
hash md5
authentication pre-share
lifetime 21600
crypto isakmp invalid-spi-recovery
crypto isakmp keepalive 60
crypto isakmp profile PROFILE1
vrf vrf-LAN
keyring customer
match identity address <IP> <MASK> vrf-LAN
keepalive 60 retry 2
crypto ipsec security-association lifetime seconds 18000
crypto ipsec security-association replay disable
crypto ipsec transform-set transform esp-3des esp-sha-hmac
mode tunnel
crypto ipsec df-bit clear
crypto map CRYPTOMAP local-address GigabitEthernet0/0/0
crypto map CRYPTOMAP 2001 ipsec-isakmp
set peer <IP> <MASK>
set security-association idle-time 200 default
set transform-set transform
set isakmp-profile PROFILE1
match address 2001

interface GigabitEthernet0/0/2
ip vrf forwarding VRF-WAN
ip address <IP> <MASK>
no ip redirects
no ip proxy-arp
crypto map CRYPTOMAP
end

interface GigabitEthernet0/0/0
ip vrf forwarding vrf-LAN
ip address <IP> <MASK>
no ip redirects
ip directed-broadcast
no ip proxy-arp

 

As you can see all which as to do with IPSEC (keyring, profile, etc...) is linked to the LAN VRF (vrf-LAN) but the crypto map is applied to the WAN interface, which is on a differente VRF

Hi, Try the modifications below in bold.

 

crypto keyring customer vrf VRF-WAN
 pre-shared-key address 0.0.0.0 0.0.0.0 key customer

 

crypto isakmp profile PROFILE1
 vrf vrf-LAN
 keyring customer
 match identity address <IP> <MASK> VRF-WAN

 

HTH

Hi, 

 

Thanks for the reply. 

 

By doing this it goes through phase 1 but fails phase 2, like it happened to me on similar tests with "mixed" configurations referencing one VRF and the other. The error now is this:

 

ISAKMP-ERROR: (1006):IPSec policy invalidated proposal with error 8
ISAKMP-ERROR: (1006):phase 2 SA policy not acceptable!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: