cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
498
Views
0
Helpful
5
Replies

ASA & Router IOS VPN problem

slupetti
Level 1
Level 1

when i try to establish a VPN lan-to-lan

between asa and cisco router ios through a nat device .Vpn work fine if router start vpn but fail if asa start.

Router logs give these errors :

*Aug 27 07:11:09.945: ISAKMP:(0:961:SW:1): processing KE

> payload. message ID = 0

> *Aug 27 07:11:09.993: ISAKMP:(0:961:SW:1): processing NONCE

> payload. message ID = 0

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1):found peer

> pre-shared key matching 85.18.244.76

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1):SKEYID state generated

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): vendor ID is Unity

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): vendor ID seems

> Unity/DPD but major 132 mismatch

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): vendor ID is XAUTH

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.001: ISAKMP:(0:961:SW:1): speaking to

> another IOS box!

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1): processing vendor

> id payload

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1):vendor ID seems

> Unity/DPD but hash mismatch

> *Aug 27 07:11:10.005: ISAKMP:received payload type 20

> *Aug 27 07:11:10.005: ISAKMP:received payload type 20

> *Aug 27 07:11:10.005: ISAKMP (0:134218689): NAT found, the

> node outside NAT

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1):Input =

> IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE

> *Aug 27 07:11:10.005: ISAKMP:(0:961:SW:1):Old State =

> IKE_R_MM3 New State = IKE_R_MM3

Someone have any suggestions ?

Thank you

5 Replies 5

andrew.prince
Level 10
Level 10

STEFANO,

Make sure both IKE policy settings are the same on both devices.

Farrukh Haroon
VIP Alumni
VIP Alumni

Most probably your phase 1 lifetimes are not same, set both the router and ASA to the same lifetime value:

crypto isakmp policy

lifetime

Regards

Farrukh

jdive
Cisco Employee
Cisco Employee

there is not eanough debugs provided here: you should enable debug cry isa and debug cry ips on both devices, and collect the full debug capture.

The problem was on encryption domain ACL .

we correct ACL on IOS router matching ASA ACL exactly and now works fine.

many thanks

NP - glad to help

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: