Joe, here you go
show run crypto (ASA)
crypto map outside_map 7 match address outside_1_cryptomap_NetEngCCIE
crypto map outside_map 7 set peer 71.2.66.243
crypto map outside_map 7 set transform-set ESP-3DES-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
show ip access-list (Router)
access-list 120 deny ip 192.168.100.0 0.0.0.255 host 10.186.56.6
access-list 120 permit ip 192.168.100.0 0.0.0.255 any
access-list 120 deny ip any any log
access-list 151 permit ip 192.168.100.0 0.0.0.255 host 10.186.56.6
access-list 151 deny ip any any lo
On Sat, May 21, 2011 at 1:32 PM, Joseph L. Brunner
<joe_at_affirmedsystems.com>wrote:
> Why is this being logged on your router?
>
> Let's see the rest of your configurations... especially the ACCESS LIST on
> the ROUTER
>
> *May 16 2011 01:35:09.394 PDT: %SEC-6-IPACCESSLOGP: list 120 denied udp
> 10.70.100.55(0) -> 10.70.100.100(0), 5 packets
> *May 16 2011 01:35:09.394 PDT: %SEC-6-IPACCESSLOGP: list 101 denied udp
> 10.70.100.100(500) -> 10.70.100.55(500), 7 packets
>
> Also on the ASA
>
> Show run crypto
>
> (paste result)
>
> -----Original Message-----
> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
> Steve Di Bias
> Sent: Saturday, May 21, 2011 4:22 PM
> To: ccielab_at_groupstudy.com
> Subject: OT: L2L Tunnel wont come up!!
>
> Hello Experts!
>
> I just finished building a tunnel between a Cisco 850 running IOS
> 12.4(15)T14 and an ASA 5510 running 8.0(3). Here are my configs::
>
> On the Router
>
> crypto isakmp policy 1
> encr 3des
> authentication pre-share
> group 2
> crypto isakmp key * address 10.70.100.100
> !
> crypto ipsec security-association lifetime seconds 28800
> !
> crypto ipsec transform-set vpn esp-3des
> !
> crypto map vpn 10 ipsec-isakmp
> set peer 10.70.100.100
> set transform-set vpn
> match address 151
>
> access-list 120 deny ip 192.168.100.0 0.0.0.255 host 10.186.56.6
> access-list 120 permit ip 192.168.100.0 0.0.0.255 any
> access-list 120 deny ip any any log
> access-list 151 permit ip 192.168.100.0 0.0.0.255 host 10.186.56.6
> access-list 151 deny ip any any log
>
> route-map NO-NAT permit 10
> match ip address 120
>
> ip nat inside source route-map NO-NAT interface FastEthernet4 overload
>
>
> On the ASA
>
> tunnel-group 10.70.100.55 type ipsec-l2l
> tunnel-group 10.70.100.55 ipsec-attributes
> pre-shared-key *
>
> access-list outside_1_cryptomap_NetEngCCIE extended permit ip host
> 10.186.56.6 192.168.100.0 255.255.255.0
> access-list outside_1_cryptomap_NetEngCCIE remark CCIE_Tunnel
>
> access-list inside_nat0_outbound extended permit ip host 10.186.56.6
> 192.168.100.0 255.255.255.0
>
> crypto map outside_map 7 match address outside_1_cryptomap_NetEngCCIE
> crypto map outside_map 7 set peer 10.70.100.55
> crypto map outside_map 7 set transform-set ESP-3DES-SHA
>
>
>
> And here are the debugs when I try to bring the tunnel up:
>
>
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0): SA request profile is (NULL)
> *May 16 2011 01:34:26.880 PDT: ISAKMP: Created a peer struct for
> 10.70.100.100, peer port 500
> *May 16 2011 01:34:26.880 PDT: ISAKMP: New peer created peer = 0x81FB0F04
> peer_handle = 0x8000000A
> *May 16 2011 01:34:26.880 PDT: ISAKMP: Locking peer struct 0x81FB0F04,
> refcount 1 for isakmp_initiator
> *May 16 2011 01:34:26.880 PDT: ISAKMP: local port 500, remote port 500
> *May 16 2011 01:34:26.880 PDT: ISAKMP: set new node 0 to QM_IDLE
> *May 16 2011 01:34:26.880 PDT: insert sa successfully sa = 82FBBE5C
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0):Can not start Aggressive mode,
> trying Main mode.
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0):found peer pre-shared key
> matching
> 10.70.100.100
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0): constructed NAT-T vendor-rfc3947
> ID
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0): constructed NAT-T vendor-07 ID
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0): constructed NAT-T vendor-03 ID
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0): constructed NAT-T vendor-02 ID
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC,
> IKE_SA_REQ_MM
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0):Old State = IKE_READY New State
> =
> IKE_I_MM1
>
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0): beginning Main Mode exchange
> SD-c850-Edge#
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0): sending packet to 10.70.100.100
> my_port 500 peer_port 500 (I) MM_NO_STATE
> *May 16 2011 01:34:26.880 PDT: ISAKMP:(0):Sending an IKE IPv4 Packet.
> SD-c850-Edge#
> SD-c850-Edge#
> SD-c850-Edge#
> SD-c850-Edge#
> SD-c850-Edge#
> *May 16 2011 01:34:36.882 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE...
> *May 16 2011 01:34:36.882 PDT: ISAKMP (0:0): incrementing error counter on
> sa, attempt 1 of 5: retransmit phase 1
> *May 16 2011 01:34:36.882 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE
> *May 16 2011 01:34:36.882 PDT: ISAKMP:(0): sending packet to 10.70.100.100
> my_port 500 peer_port 500 (I) MM_NO_STATE
> *May 16 2011 01:34:36.882 PDT: ISAKMP:(0):Sending an IKE IPv4 Packet.
> SD-c850-Edge#
> *May 16 2011 01:34:46.885 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE...
> *May 16 2011 01:34:46.885 PDT: ISAKMP (0:0): incrementing error counter on
> sa, attempt 2 of 5: retransmit phase 1
> *May 16 2011 01:34:46.885 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE
> *May 16 2011 01:34:46.885 PDT: ISAKMP:(0): sending packet to 10.70.100.100
> my_port 500 peer_port 500 (I) MM_NO_STATE
> *May 16 2011 01:34:46.885 PDT: ISAKMP:(0):Sending an IKE IPv4 Packet.
> SD-c850-Edge#
> *May 16 2011 01:34:56.879 PDT: ISAKMP: set new node 0 to QM_IDLE
> *May 16 2011 01:34:56.879 PDT: ISAKMP:(0):SA is still budding. Attached new
> ipsec request to it. (local 10.70.100.55, remote 10.70.100.100)
> *May 16 2011 01:34:56.879 PDT: ISAKMP: Error while processing SA request:
> Failed to initialize SA
> *May 16 2011 01:34:56.879 PDT: ISAKMP: Error while processing KMI message
> 0,
> error 2.
> *May 16 2011 01:34:56.887 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE...
> *May 16 2011 01:34:56.887 PDT: ISAKMP (0:0): incrementing error counter on
> sa, attempt 3 of 5: retransmit phase 1
> *May 16 2011 01:34:56.887 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE
> SD-c850-Edge#
> *May 16 2011 01:34:56.887 PDT: ISAKMP:(0): sending packet to 10.70.100.100
> my_port 500 peer_port 500 (I) MM_NO_STATE
> *May 16 2011 01:34:56.887 PDT: ISAKMP:(0):Sending an IKE IPv4 Packet.
> SD-c850-Edge#
> *May 16 2011 01:35:06.889 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE...
> *May 16 2011 01:35:06.889 PDT: ISAKMP (0:0): incrementing error counter on
> sa, attempt 4 of 5: retransmit phase 1
> *May 16 2011 01:35:06.889 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE
> *May 16 2011 01:35:06.889 PDT: ISAKMP:(0): sending packet to 10.70.100.100
> my_port 500 peer_port 500 (I) MM_NO_STATE
> *May 16 2011 01:35:06.889 PDT: ISAKMP:(0):Sending an IKE IPv4 Packet.
> SD-c850-Edge#
> *May 16 2011 01:35:09.394 PDT: %SEC-6-IPACCESSLOGP: list 120 denied udp
> 10.70.100.55(0) -> 10.70.100.100(0), 5 packets
> *May 16 2011 01:35:09.394 PDT: %SEC-6-IPACCESSLOGP: list 101 denied udp
> 10.70.100.100(500) -> 10.70.100.55(500), 7 packets
> SD-c850-Edge#
> *May 16 2011 01:35:16.891 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE...
> *May 16 2011 01:35:16.891 PDT: ISAKMP (0:0): incrementing error counter on
> sa, attempt 5 of 5: retransmit phase 1
> *May 16 2011 01:35:16.891 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE
> *May 16 2011 01:35:16.891 PDT: ISAKMP:(0): sending packet to 10.70.100.100
> my_port 500 peer_port 500 (I) MM_NO_STATE
> *May 16 2011 01:35:16.891 PDT: ISAKMP:(0):Sending an IKE IPv4 Packet.
> SD-c850-Edge#
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0): retransmitting phase 1
> MM_NO_STATE...
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0):peer does not do paranoid
> keepalives.
>
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0):deleting SA reason "Death by
> retransmission P1" state (I) MM_NO_STATE (peer 10.70.100.100)
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0):deleting SA reason "Death by
> retransmission P1" state (I) MM_NO_STATE (peer 10.70.100.100)
> *May 16 2011 01:35:26.894 PDT: ISAKMP: Unlocking peer struct 0x81FB0F04 for
> isadb_mark_sa_deleted(), count 0
> *May 16 2011 01:35:26.894 PDT: ISAKMP: Deleting peer node by peer_reap for
> 10.70.100.100: 81FB0F04
> SD-c850-Edge#
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0):deleting node 1945611004 error
> FALSE reason "IKE deleted"
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0):deleting node 1604588444 error
> FALSE reason "IKE deleted"
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
> IKE_PHASE1_DEL
> *May 16 2011 01:35:26.894 PDT: ISAKMP:(0):Old State = IKE_I_MM1 New State
> =
> IKE_DEST_SA
>
>
>
> Any ideas on what is causing this?? Thanks in advance!
>
>
>
> --
> -Steve Di Bias
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
>
>
>
>
>
>
-- -Steve Di Bias Blogs and organic groups at http://www.ccie.netReceived on Sat May 21 2011 - 13:43:39 ART
This archive was generated by hypermail 2.2.0 : Wed Jun 01 2011 - 09:01:11 ART