10-13-2017 03:23 AM - edited 03-12-2019 04:37 AM
Hi all,
Cannot get the the vpn ikev2 to authicate using certificates.
Get the following debug
(96):
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_DONE
IKEv2-PROTO-5: (96): Cisco DeleteReason Notify is enabled
IKEv2-PROTO-2: (96): Completed SA init exchange
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_CHK4_ROLE
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: INIT_DONE Event: EV_START_TMR
IKEv2-PROTO-2: (96): Starting timer (30 sec) to wait for auth message
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_NO_EVENT
LONDC-VPNFW-01/prod# IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: R_WAIT_AUTH Event: EV_WAIT4_AUTH_TMO
IKEv2-PROTO-1: (96): Failed to receive the AUTH msg before the timer expired
IKEv2-PROTO-1: (96):
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: AUTH_DONE Event: EV_FAIL
IKEv2-PROTO-2: (96): Auth exchange failed
IKEv2-PROTO-1: (96): Auth exchange failed
IKEv2-PROTO-1: (96): Auth exchange failed
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: EXIT Event: EV_ABORT
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: EXIT Event: EV_CHK_PENDING_ABORT
IKEv2-PROTO-5: (96): SM Trace-> SA: I_SPI=0EB92F8B306D2B27 R_SPI=2EE5B0F380F21D2D (R) MsgID = 00000000 CurState: EXIT Event: EV_UPDATE_CAC_STATS
IKEv2-PROTO-2: (96): Abort exchange
IKEv2-PROTO-2: (96): Deleting SA
The CA certificate is installed as well as the identity cert, (signed CSR by the CA )
Any further help folks would be great !
Cheers
Tony
10-13-2017 06:27 AM
Hello @Tony JOrdan,
The VPN tunnel failed on authentication and as you are saying it is certificates, one question, are the identity certificates from the same CA? if not, you need to also upload the CAs certificates from remote end in order to validate the identity.
Also, can you share the debugs fro certs?
debug crypto ca
debug crypto ca transactions
debug crypto ca messages
HTH
Gio
10-13-2017 08:21 AM
Hi Gio,
yes the same CA cert installed.
I'll upload the debug once I get it
Cheers
Tony
10-18-2017 12:28 PM - edited 10-18-2017 12:46 PM
Hi all,
I've added the router and asa configs, as well as the certs.
asa debug
asa1# sh deb
debug crypto ipsec enabled at level 250
debug crypto ca enabled at level 250
debug crypto ca messages enabled at level 250
debug crypto ca transactions enabled at level 250
debug crypto ikev2 protocol enabled at level 250
debug crypto ikev2 platform enabled at level 250
router debug
R1#sh deb
IKEV2:
IKEv2 error debugging is on
IKEv2 packet debugging is on
IKEv2 internal debugging is on
PKI:
Crypto PKI Msg debugging is on
Crypto PKI Trans debugging is on
Crypto PKI Validation Path debugging is on
cheers
tony
10-18-2017 01:03 PM - edited 10-18-2017 01:19 PM
10-18-2017 01:09 PM - edited 10-18-2017 01:20 PM
10-18-2017 01:21 PM - edited 10-19-2017 02:42 AM
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: