cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
502
Views
0
Helpful
5
Replies

ASA & Router IOS VPN problem

slupetti
Level 1
Level 1

when i try to establish a VPN lan-to-lan

between asa and cisco router ios through a nat device .Vpn work fine if router start vpn but fail if asa start.

Router logs give these errors :

*Aug 27 07:11:09.945: ISAKMP:(0:961:SW:1): processing KE

> payload. message ID = 0

> *Aug 27 07:11:09.993: ISAKMP:(0:961:SW:1): processing NONCE

> payload. message ID = 0

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1):found peer

> pre-shared key matching 85.18.244.76

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1):SKEYID state generated

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): vendor ID is Unity

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): vendor ID seems

> Unity/DPD but major 132 mismatch

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): vendor ID is XAUTH

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): speaking to

> another IOS box!

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1):vendor ID seems

> Unity/DPD but hash mismatch

> *Aug 27 07:11:10.005: ISAKMP:received payload type 20

> *Aug 27 07:11:10.005: ISAKMP:received payload type 20

> *Aug 27 07:11:10.005: ISAKMP (0:134218689): NAT found, the

> node outside NAT

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1):Input =

> IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1):Old State =

> IKE_R_MM3 New State = IKE_R_MM3

Someone have any suggestions ?

Thank you

5 Replies 5

andrew.prince
Level 10
Level 10

STEFANO,

Make sure both IKE policy settings are the same on both devices.

Farrukh Haroon
VIP Alumni
VIP Alumni

Most probably your phase 1 lifetimes are not same, set both the router and ASA to the same lifetime value:

crypto isakmp policy

lifetime

Regards

Farrukh

jdive
Cisco Employee
Cisco Employee

there is not eanough debugs provided here: you should enable debug cry isa and debug cry ips on both devices, and collect the full debug capture.

The problem was on encryption domain ACL .

we correct ACL on IOS router matching ASA ACL exactly and now works fine.

many thanks

NP - glad to help