cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
15196
Views
5
Helpful
5
Replies

ASA 5510 L2L-VPN: Internal Error...

marcbujack
Level 1
Level 1

Hi there,

i try to connect a astaro-firewall per l2l-vpn to an asa5510.

I got allways the following message.

Whats wrong? (cheched the parameters already)

Regards

Marc

asa %ASA-4-713903: Group = x.x.x.x, IP = x.x.x.x, Freeing previously allocated memory for authorization-dn-attributes

asa %ASA-3-713119: Group = x.x.x.x, IP = x.x.x.x, PHASE 1 COMPLETED

asa %ASA-5-713904: Group = x.x.x.x, IP = x.x.x.x, All IPSec SA proposals found unacceptable!

asa %ASA-3-713902: Group = x.x.x.x, IP = x.x.x.x, QM FSM error (P2 struct &0x7bc32f0, mess id 0xc5da78b7)!

asa %ASA-3-713902: Group = x.x.x.x, IP = x.x.x.x, Removing peer from correlator table failed, no match!

asa %ASA-3-713231: Group = x.x.x.x, IP = x.x.x.x, Internal Error, ike_lock trying to unlock bit that is not locked for type SA_LOCK_P1_SA_CREATE

asa %ASA-3-713232: Group = x.x.x.x, IP = x.x.x.x, SA lock refCnt = 0, bitmask = 00000000, p1_decrypt_cb = 0, qm_decrypt_cb = 1, qm_hash_cb = 0, qm_spi_ok_cb = 0, qm_dh_cb = 0, qm_secret_key_cb = 0, qm_encrypt_cb = 0

asa %ASA-3-713902: Group = x.x.x.x, IP = x.x.x.x, Removing peer from correlator table failed, no match!

asa %ASA-4-113019: Group = x.x.x.x, Username = x.x.x.x, IP = x.x.x.x, Session disconnected. Session Type: IPSecLAN2LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: Phase 2 Mismatch

1 Accepted Solution

Accepted Solutions

Thanks Marc.

Eric

214.298.7610

View solution in original post

5 Replies 5

DialerString_2
Level 3
Level 3

Check your natting and crypto acls. I ran into the same issue months back. Can you post the relevant crypto information for both sides?

Hi,

i have no access to the astaro-firewall.

Here is my config:

The host on my side must be natted towards the customer.

access-list POLICY_NAT extended permit ip host host

access-list CRYPTO_MAP extended permit ip host host

static (inside,outside) access-list POLICY_NAT


crypto ipsec transform-set TSET esp-3des esp-md5-hmac

crypto map outside_map 220 match address CRYPTO_MAP
crypto map outside_map 220 set pfs group5
crypto map outside_map 220 set peer x.x.x.x
crypto map outside_map 220 set transform-set TSET
crypto map outside_map 220 set security-association lifetime seconds 3600

Regards

Marc

I notice that your static entry is numbered 220 - do you have Dynamic maps on the ASA? If so, the dynamic crypto map should have a higher sequence number. Check this first.

Why are you using the "POLICY_NAT" - Why not just exempt the traffic destined to that host or network:

nat (inside) 0 access-list 99

access-list 99 extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0 or nat-host to customer-host.

Hi,

there are several other vpn-tunnels.

Dynamic maps are located at 65.000ff.

The solution with the static map was an cisco-suggestion. With other customers it worked fine.

I solved this problem by using 3des and md5 without pfs.

Thanx for your advice

Marc

Thanks Marc.

Eric

214.298.7610

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: