08-02-2018 07:35 AM
Hello,
I am currently experiencing an issue with this message showing up in my syslog for several of my 7206VXR's they are running 12.1(14)E6.
Aug 2 10:20:16 router 400: Aug 2 10:20:15: %CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet has invalid spi for destaddr=x.x.x.x, prot=17, spi=0x112233(1122867), srcaddr=83.143.246.30 Aug 2 10:21:31 router 47491: Aug 2 10:21:30: %CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet has invalid spi for destaddr=x.x.x.x, prot=17, spi=0x112233(1122867), srcaddr=185.183.105.18
We are not running any remote access or site-to-site ipsec tunnels. The only thing that is being used that involves ipsec is our ipv6 ospf authenticates using ipsec. I have searched everywhere for a solution but cannot figure out how to prevent these ip's from triggering these alerts. I do not want to block the individual ip's as these attacks almost always seem to come from different ip's and different ranges.
Any help is greatly appreciated!
Solved! Go to Solution.
08-02-2018 08:14 AM
08-02-2018 07:46 AM
08-02-2018 07:58 AM
Thanks for the quick response! Would disabling crypto isakmp interfere with the ipv6 ospf ipsec authentication?
08-02-2018 08:06 AM
08-02-2018 08:10 AM
Yes it was already enabled, the ospf works with our other local router but I do not want to block ipsec traffic completely as there are most definitely valid ipsec traffic passing through public side of the router. I would hopefully like to just block ipsec to the router itself without needing to block UDP 500 and 4500 to each individual ip programmed on each router
08-02-2018 08:14 AM
08-02-2018 08:19 AM
I will give that a try thank you for your help!
08-02-2018 08:00 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide