From: Richard Hanks (ccieingroup@hotmail.com)
Date: Mon Dec 23 2002 - 20:58:11 GMT-3
Hi Guys,
For preparing the lab test, I did some practices about IPSec on my routers.
When I used the ip address to build the peer relationship, everything works
fine. But when I replaced the "ip address" to the hostname + identity, no
matter what I tried, the isakmp peer can not be built. Could you give me some
hints or advices about my configuration? Thanks a lot and Merry Christmas!
R4(e0:10.0.0.4)------IPSec--------(e0:10.0.0.5)R5
R5:
hostname r5
ip host r4.cisco.com 10.0.0.4
ip domain-name cisco.com
!
crypto isakmp policy 10
 authentication pre-share
 encryption des
!
crypto isakmp key cisco hostname r4.cisco.com ( I also tried the r4 here)
crypto isakmp identity hostname
!
crypto ipsec transform-set trans1 esp-des
!
crypto map map1 10 ipsec-isakmp
 set peer 10.0.0.4 (when set the r4.cisco.com, which was replaced by the ip
automatically)
 set transform-set trans1
 match address 100
!
interface Ethernet0
 ip address 10.0.0.5 255.255.255.0
 no ip mroute-cache
 crypto map map1
access-list 100 permit icmp any any
R4:
hostname r4
ip host r5.cisco.com 10.0.0.5
ip domain-name cisco.com
!
crypto isakmp policy 10
 authentication pre-share
 encryption des
!
crypto isakmp key cisco hostname r5.cisco.com ( I also tried the r5 here)
crypto isakmp identity hostname
!
crypto ipsec transform-set trans1 esp-des
!
crypto map map1 10 ipsec-isakmp
 set peer 10.0.0.5
 set transform-set trans1
 match address 100
!
interface Ethernet0
 ip address 10.0.0.4 255.255.255.0
 no ip mroute-cache
 crypto map map1
access-list 100 permit icmp any any
After I ping 10.0.0.5 from R4. It is .....
r4#sh cry isa sa
    dst           src          state        conn-id   slot
10.0.0.5      10.0.0.4       AG_INIT_EXCH      1       0
r4#p 10.0.0.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.5, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
r4#
*Mar  1 01:04:38: IPSEC(sa_request): ,
  (key eng. msg.) src= 10.0.0.4, dest= 10.0.0.5,
    src_proxy= 0.0.0.0/0.0.0.0/1/0 (type=4),
    dest_proxy= 0.0.0.0/0.0.0.0/1/0 (type=4),
    protocol= ESP, transform= esp-des ,
    lifedur= 3600s and 4608000kb,
    spi= 0xB1B026B(186319467), conn_id= 0, keysize= 0, flags= 0x4004
*Mar  1 01:04:38: ISAKMP: received ke message (1/1)
*Mar  1 01:04:40: ISAKMP (1): ID payload
        next-payload : 0
        type         : 2
        protocol     : 17
        port         : 500
        length       : 16
*Mar  1 01:04:40: ISAKMP (1): Total payload length: 20
*Mar  1 01:04:40: ISAKMP (0:1): beginning Aggressive Mode exchange
*Mar  1 01:04:40: ISAKMP (1): sending packet to 10.0.0.5 (I) AG_INIT_EXCH
*Mar  1 01:04:40: ISAKMP (1): received packet from 10.0.0.5 (I) AG_INIT_EXCH
*Mar  1 01:04:40: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Informational
mode
failed with peer at 10.0.0.5
r4#
.
This archive was generated by hypermail 2.1.4 : Fri Jan 17 2003 - 17:21:52 GMT-3