What turns out.
In logs on asa.
All IPSec SA proposals found unacceptable
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, processing SA payload
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, processing ke payload
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, processing ISA_KE payload
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, processing nonce payload
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, processing ID payload
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, processing VID payload
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, Received Cisco Unity client VID
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, processing VID payload
Apr 09 12:03:06 [IKEv1 DEBUG]: IP = x.x.x.x, Received DPD VID
Apr 09 12:03:06 [IKEv1]: IP = x.x.x.x, Connection landed on tunnel_group MT
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing IKE SA payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 8
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing ISAKMP SA payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing ke payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing nonce payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, Generating keys for Responder...
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing ID payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing hash payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, Computing hash for ISAKMP
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing Cisco Unity VID payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing xauth V6 VID payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing dpd vid payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing Fragmentation VID + extended capabilities payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing VID payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
Apr 09 12:03:06 [IKEv1]: IP = x.x.x.x, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 382
Apr 09 12:03:06 [IKEv1]: IP = x.x.x.x, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NONE (0) total length : 52
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing hash payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, Computing hash for ISAKMP
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, PHASE 1 COMPLETED
Apr 09 12:03:06 [IKEv1]: IP = x.x.x.x, Keep-alive type for this connection: DPD
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, Starting P1 rekey timer: 82080 seconds.
Apr 09 12:03:06 [IKEv1 DECODE]: IP = x.x.x.x, IKE Responder starting QM: msg id = bda4f006
Apr 09 12:03:06 [IKEv1]: IP = x.x.x.x, IKE_DECODE RECEIVED Message (msgid=bda4f006) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 164
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing hash payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing SA payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing nonce payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing ID payload
Apr 09 12:03:06 [IKEv1 DECODE]: Group = MT, IP = x.x.x.x, ID_IPV4_ADDR_SUBNET ID received--192.168.88.0--255.255.255.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Received remote IP Proxy Subnet data in ID Payload: Address 192.168.88.0, Mask 255.255.255.0, Protocol 0, Port 0
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing ID payload
Apr 09 12:03:06 [IKEv1 DECODE]: Group = MT, IP = x.x.x.x, ID_IPV4_ADDR_SUBNET ID received--192.168.x.0--255.255.255.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Received local IP Proxy Subnet data in ID Payload: Address 192.168.x.0, Mask 255.255.255.0, Protocol 0, Port 0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, QM IsRekeyed old sa not found by addr
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, checking map = OutSide_map, seq = 40...
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, map = OutSide_map, seq = 40, ACL does not match proxy IDs src:192.168.88.0 dst:192.168.x.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, checking map = OutSide_map, seq = 50...
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, map = OutSide_map, seq = 50, ACL does not match proxy IDs src:192.168.88.0 dst:192.168.x.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, checking map = OutSide_map, seq = 60...
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, map = OutSide_map, seq = 60, ACL does not match proxy IDs src:192.168.88.0 dst:192.168.x.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, checking map = OutSide_map, seq = 70...
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, map = OutSide_map, seq = 70, ACL does not match proxy IDs src:192.168.88.0 dst:192.168.x.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, checking map = OutSide_map, seq = 80...
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, map = OutSide_map, seq = 80, ACL does not match proxy IDs src:192.168.88.0 dst:192.168.x.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, checking map = OutSide_map, seq = 90...
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, map = OutSide_map, seq = 90, ACL does not match proxy IDs src:192.168.88.0 dst:192.168.x.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, checking map = OutSide_map, seq = 100...
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Static Crypto Map check, map = OutSide_map, seq = 100, ACL does not match proxy IDs src:192.168.88.0 dst:192.168.x.0
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, IKE Remote Peer configured for crypto map: OutSide_dyn_map
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, processing IPSec SA payload
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, All IPSec SA proposals found unacceptable!
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, sending notify message
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing blank hash payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing ipsec notify payload for msg id bda4f006
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing qm hash payload
Apr 09 12:03:06 [IKEv1]: IP = x.x.x.x, IKE_DECODE SENDING Message (msgid=8f7e901a) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, QM FSM error (P2 struct &0x45fbf50, mess id 0xbda4f006)!
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, IKE QM Responder FSM error history (struct &0x45fbf50) <state>, <event>: QM_DONE, EV_ERROR-->QM_BLD_MSG2, EV_NEGO_SA-->QM_BLD_MSG2, EV_IS_REKEY-->QM_BLD_MSG2, EV_CONFIRM_SA-->QM_BLD_MSG2, EV_PROC_MSG-->QM_BLD_MSG2, EV_HASH_OK-->QM_BLD_MSG2, NullEvent-->QM_BLD_MSG2, EV_COMP_HASH
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, sending delete/delete with reason message
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Removing peer from correlator table failed, no match!
Apr 09 12:03:06 [IKEv1]: Group = MT, IP = x.x.x.x, Could not delete route for L2L peer that came in on a dynamic map. address: 192.168.88.0, mask: 255.0.0.0
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, IKE SA AM:b5e048da rcv'd Terminate: state AM_ACTIVE flags 0x00004041, refcnt 1, tuncnt 0
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, IKE SA AM:b5e048da terminating: flags 0x01004001, refcnt 0, tuncnt 0
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, sending delete/delete with reason message
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing blank hash payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing IKE delete payload
Apr 09 12:03:06 [IKEv1 DEBUG]: Group = MT, IP = x.x.x.x, constructing qm hash payload
Apr 09 12:03:06 [IKEv1]: IP = x.x.x.x, IKE_DECODE SENDING Message (msgid=fd3a7b54) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
Apr 09 12:03:07 [IKEv1]: IP = x.x.x.x, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 298
Yes, I have other lan-to-lan tunnels to different static addresses and I can see how they get through.
It seems to me that there is a search for subnets 192.168.x.0 192.168.88.0.
But why not see:
access-list OutSide_cryptomap_110 extended permit ip 192.168.x.0 255.255.255.0 192.168.88.0 255.255.255.0
crypto dynamic-map OutSide_dyn_map 110 match address OutSide_cryptomap_110
crypto dynamic-map OutSide_dyn_map 110 set transform-set ESP-AES-256-SHA
log from mikrotik attachment
On mikrotik.
General.
IPsec Policy:
Tunel - V
Src.Adress: 192.168.88.0/24
Dst.Adress: 192.168.x.0/24
Protocol: 255(all)
Action.
Action: encrypt
Level: unique
IPsec Protocols: esp
Proposal: MT
Status:
Is changing.
PH2 State: no phase2 ↔ msg1 sent
Syslog Messages_4.csv (27.1 KB)