Using RB750 ROS4.9 I can not initiate an IPSEC Tunnel to the Cisco. The Cisco can initiate the tunnel to the RB750 successfully.
How do I get this to work? Below is the log from the RB750 and the IPSEC configuration.
17:09:24 ipsec initiate new phase 1 negotiation: 65.10.10.10[500]<=>216.40.40.40[500]
17:09:24 ipsec begin Identity Protection mode.
17:09:24 ipsec received broken Microsoft ID: FRAGMENTATION
17:09:24 ipsec received Vendor ID: CISCO-UNITY
17:09:24 ipsec received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
17:09:25 ipsec received Vendor ID: DPD
17:09:25 ipsec ISAKMP-SA established 65.10.10.10[500]-216.40.40.40[500] spi:22a9d57be19cffec:454175ce55c5d921
17:09:25 ipsec initiate new phase 2 negotiation: 65.10.10.10[500]<=>216.40.40.40[500]
17:09:25 ipsec fatal NO-PROPOSAL-CHOSEN notify messsage, phase1 should be deleted.
17:09:25 ipsec Message: 'Mi '.
17:09:25 ipsec ISAKMP-SA expired 65.10.10.10[500]-216.40.40.40[500] spi:22a9d57be19cffec:454175ce55c5d921
17:09:55 ipsec 216.40.40.40 give up to get IPsec-SA due to time up to wait.
17:09:55 ipsec IPsec-SA expired: ESP/Tunnel 216.40.40.40[0]->65.10.10.10[0] spi=248785156(0xed42904)
did you figure out the problem, I have exactly the same problem only I don’t have access to the Cisco and the guy managing the Cisco won’t give me access and is not PIX proficient either? It worked earlier today, but somewhere along the line he changed something and doesn’t know it. it’s taken me a week to get these guys this far and its getting painfully frustrating…
I have the same issue with same logs. But, in my case, Cisco side require what tunnel will be from internal address such 10.254.x.x. By their security policy, they cannot change this. Ifter i succefuly complete phase 1, on phase two i get reject of tunnel. Now i cannot have a idea, how i can make the ipsec tunnel with internal address. Maybe anyone can give me advice ?
13700 09/18/2010 14:39:52.260 SEV=4 AUTH/22 RPT=37332 89.28.xx.xx User [89.28.xx.xx] Group [89.28.xx.xx] connected, Session Type: IPSec/LAN-to-LAN
13702 09/18/2010 14:39:52.530 SEV=5 IKE/25 RPT=44764 89.28.xx.xx Group [89.28.xx.xx] Received remote Proxy Host data in ID Payload:
Address 89.28.67.69, Protocol 0, Port 0
13705 09/18/2010 14:39:52.530 SEV=5 IKE/24 RPT=13283 89.28.xx.xx Group [89.28.xx.xx] Received local Proxy Host data in ID Payload:
Address 62.13.170.66, Protocol 0, Port 0
13708 09/18/2010 14:39:52.530 SEV=4 IKE/61 RPT=8733 89.28.xx.xx Group [89.28.xx.xx] Tunnel rejected: Policy not found for Src:89.28.67.69, Dst: 62.13.xx.xx!
13710 09/18/2010 14:39:52.530 SEV=4 IKEDBG/97 RPT=25717 89.28.xx.xx Group [89.28.xx.xx] QM FSM error (P2 struct &0x5ffa6a4, mess id 0x9b0ef58b)!
I made vlan to internal interface with needed address. Introduce it on ipsec policy as source address. After this, made a src-nat rules to send traffic to needed lan through created vlan. And, everything works fine.