First attempt at ipsec L2L on an XG. Looks like we're not making it to phase 1, the XG ip never shows up in sh cry isakmp sa on the ASA and pings from XG lan to private subnet behind the ASA get sent out the default wan route thus going nowhere. The ASA currently has an active L2L with an external Cisco IOS device I've been going over for reference. Any hints are appreciated.
ASA5520 8.4(7) = 1.1.1.1
XG230_WP01_15.01.0.376 = 2.2.2.2
XG230 LAN = 172.30.0.0/22
ASA -
tunnel-group 2.2.2.2 type ipsec-l2l
tunnel-group 2.2.2.2 ipsec-attributes
ikev1 pre-shared-key MyKeyHere!!
peer-id-validate nocheck
isakmp keepalive disable
access-list outside_cryptomap_2 extended permit ip object-group INTERNAL_NETWORKS 172.30.0.0 255.255.252.0
crypto map outside_map 2 match address outside_cryptomap_2
crypto map outside_map 2 set pfs group1
crypto map outside_map 2 set peer 2.2.2.2
crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
access-list outside_access_in extended permit object-group ip_udp_tcp_icmp host 2.2.2.2 any
debug crypto engine enabled at level 127
debug crypto ikev1 enabled at level 127
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
Jan 28 13:38:11 [IKEv1]IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 272
Jan 28 13:38:11 [IKEv1 DEBUG]IP = 2.2.2.2, processing SA payload
Jan 28 13:38:11 [IKEv1]IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 164
Jan 28 13:38:11 [IKEv1 DEBUG]IP = 2.2.2.2, All SA proposals found unacceptable
Jan 28 13:38:11 [IKEv1]IP = 2.2.2.2, Error processing payload: Payload ID: 1
Jan 28 13:38:11 [IKEv1 DEBUG]IP = 2.2.2.2, IKE MM Responder FSM error history (struct &0x785729d8) <state>, <event>: MM_DONE, EV_ERROR-->MM_START, EV_RCV_MSG-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM
Jan 28 13:38:11 [IKEv1 DEBUG]IP = 2.2.2.2, IKE SA MM:e79f27a0 terminating: flags 0x01000002, refcnt 0, tuncnt 0
Jan 28 13:38:11 [IKEv1 DEBUG]IP = 2.2.2.2, sending delete/delete with reason message
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
Jan 28 13:38:50 [IKEv1]IP = 2.2.2.2, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 272
Jan 28 13:38:50 [IKEv1 DEBUG]IP = 2.2.2.2, processing SA payload
Jan 28 13:38:50 [IKEv1]IP = 2.2.2.2, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 164
Jan 28 13:38:50 [IKEv1 DEBUG]IP = 2.2.2.2, All SA proposals found unacceptable
Jan 28 13:38:50 [IKEv1]IP = 2.2.2.2, Error processing payload: Payload ID: 1
Jan 28 13:38:50 [IKEv1 DEBUG]IP = 2.2.2.2, IKE MM Responder FSM error history (struct &0x762c9810) <state>, <event>: MM_DONE, EV_ERROR-->MM_START, EV_RCV_MSG-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM-->MM_START, EV_START_MM
Jan 28 13:38:50 [IKEv1 DEBUG]IP = 2.2.2.2, IKE SA MM:94681887 terminating: flags 0x01000002, refcnt 0, tuncnt 0
Jan 28 13:38:50 [IKEv1 DEBUG]IP = 2.2.2.2, sending delete/delete with reason message
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
CTM ERROR: Invalid input parameters, ctm_get_scb_prot_stats:1565
XG 230 -
System >> VPN >> IPsec >>
connection type = site to site
policy = defaultbranchoffice
action on vpn restart = initiate
auth type = preshared key
local = port 2 2.2.2.2 / remote = 1.1.1.1
ipv4
local subnet = any
local id = ip address 2.2.2.2
/var/tslog/ipsec.log:
Jan 28 13:32:50 "MYASA-1" #32: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
Jan 28 13:32:50 "MYASA-1" #32: starting keying attempt 2 of an unlimited number
Jan 28 13:32:50 "MYASA-1" #33: initiating Main Mode to replace #32
Jan 28 13:33:20 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:33:40 pending Quick Mode with 1.1.1.1 "MYASA-1" took too long -- replacing phase 1
Jan 28 13:33:40 "MYASA-1" #34: initiating Main Mode to replace #33
Jan 28 13:33:40 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:33:40 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:33:50 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:33:50 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:34:10 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:34:10 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:34:50 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:34:50 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:35:30 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:35:30 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:36:10 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:36:10 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:36:50 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:36:50 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:37:30 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:37:30 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:38:11 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:38:11 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:38:50 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:38:50 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:39:30 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:39:30 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:40:10 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:40:10 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:40:50 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:40:50 packet from 1.1.1.1:500: received and ignored informational message
Jan 28 13:41:30 packet from 1.1.1.1:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN
Jan 28 13:41:30 packet from 1.1.1.1:500: received and ignored informational message
System
> Diagnostics
> Log Viewer
2016-01-28 13:43:30
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:42:50
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:42:10
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:41:30
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:40:50
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:40:10
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:39:30
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:38:50
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:38:11
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:37:30
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:36:50
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:36:10
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:35:30
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:34:50
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:34:10
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:33:50
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:33:40
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
2016-01-28 13:33:40
IPsec
SUCCESSFUL
-
"MYASA-1" SA-MGT: Initiating rekeying of connection's main mode SA 33
17884
2016-01-28 13:33:40
IPsec
SUCCESSFUL
-
"MYASA-1" SA-MGT: Phase1 SA is being re-keyed
17886
2016-01-28 13:33:20
IPsec
SUCCESSFUL
-
EST-P1: Peer did not accept any proposal sent
17853
This thread was automatically locked due to age.