从思科转为MSR5620,ipsec vpn协商sa在第二阶段失败,报错如下;检查了ACL匹配到流量的,对端设备无法知道是什么设备也无法看到配置,只确认将ipsec 目的地址更改过。这配置是否有问题呢?
%Jan 13 15:28:44:172 2025 sge IKE/6/IKE_P2_SA_ESTABLISH_FAIL: Failed to establish phase 2 SA in IKE_P2_STATE_GETSP state.
Reason: Failed to get IPsec policy as phase 2 responder.
SA information:
Role: responder
Local address: 117.131.55.162
Remote address: 183.195.117.253
Sour addr: / Port: 0 Protocol:
Dest addr: / Port: 0 Protocol:
Inside VPN instance:
Outside VPN instance:
Inbound AH SPI: 0
Outbound AH SPI: 0
Inbound ESP SPI: 0
Outbound ESP SPI: 0
Initiator COOKIE: a0654bcc9a86874f
Responder COOKIE: 4428d755ad7310c3
Message ID: 0xdae5fa1a
Connection ID: 3204
Tunnel ID: 1
%Jan 13 15:28:46:227 2025 sge IPSEC/6/IPSEC_SA_ESTABLISH_FAIL: Failed to establish IPsec SA.
Reason: The policy contains incorrect ACL or IKE profile configuration..
SA information:
Role: responder.
Local address: 117.131.55.162
Remote address: 183.195.117.253
Sour addr: 19.255.34.80/255.255.255.240 Port: 0 Protocol: IP
Dest addr: 19.194.208.0/255.255.254.0 Port: 0 Protocol: IP
Inside VPN instance:
Outside VPN instance:
Inbound AH SPI: 0
Outbound AH SPI: 0
MSR配置
acl advanced name IPSec
rule 0 permit ip source 19.255.34.80 0.0.0.15 destination 19.194.208.0 0.0.1.255
#
pki domain sge
ca identifier sge
certificate request from ca
certificate request entity sge
public-key rsa general name sge
undo crl check enable
#
pki entity sge
common-name sge
#
pki certificate access-control-policy policy1
rule 1 permit group2
#
pki certificate attribute-group group2
attribute 1 subject-name dn ctn sge
#
ipsec logging packet enable
ipsec sa idle-time 7200
ipsec logging negotiation enable
ipsec logging ipsec-p2mp enable
#
ipsec transform-set tran1
esp encryption-algorithm 3des-cbc
esp authentication-algorithm sha1
pfs dh-group2
#
ipsec policy IPSec_CMCC 10 isakmp
transform-set tran1
security acl name IPSec
remote-address 183.195.117.253
ike-profile To_CMCC
sa duration time-based 7200
#
ike logging negotiation enable
#
ike profile To_CMCC
certificate domain sge
proposal 10
#
ike proposal 10
authentication-method rsa-signature
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
sa duration 7200
#
原思科设备配置
crypto isakmp policy 10
encr 3des
hash md5
group 2
lifetime 7200
!
crypto ipsec security-association lifetime seconds 7200
!
crypto ipsec transform-set set1 esp-3des esp-sha-hmac
mode tunnel
!
!
!
crypto map vpnmap 10 ipsec-isakmp
set peer 183.195.117.253
set transform-set set1
match address 100
(0)
根据您提供的错误信息以及问题描述,MSR5620在IPsec VPN的第二阶段协商失败的常见原因和排查建议如下:
从错误日志中可以看出:
第一阶段协商成功:
第二阶段失败原因:
Reason: Failed to get IPsec policy as phase 2 responder.
以及:
Reason: The policy contains incorrect ACL or IKE profile configuration.
表明问题可能集中在以下几点:
流量选择器(Traffic Selector)不匹配:
Sour addr: 19.255.34.80/255.255.255.240
Dest addr: 19.194.208.0/255.255.254.0
如果本地配置的流量选择器与对端配置不一致,协商会失败。acl number 3001
rule 10 permit ip source 19.255.34.80 0.0.0.15 destination 19.194.208.0 0.0.1.255
transform-set
与对端一致,包括加密算法、认证算法和PFS等。ipsec proposal 1
esp authentication-algorithm sha1
esp encryption-algorithm aes-256
pfs dh-group2
ike proposal 1
encryption-algorithm aes-256
authentication-algorithm sha1
dh-group2
prf sha1
ipsec policy
或ike peer
配置中的远端地址。ike peer peer1
remote-address 183.195.117.253
ipsec policy 1 10 isakmp
transform-set 1
nat-traversal enable
debugging ike common
debugging ipsec error
debugging ipsec packet
检查是否有关于流量选择器或加密配置的具体错误。reset ike sa
reset ipsec sa
验证基础连接:
使用诊断命令:
display ipsec policy
display ipsec sa
display ike sa
联系对端管理员:
您的配置可能存在以下问题:
按照上述排查步骤,调整配置并启用调试日志进一步定位问题。如果需要更详细的帮助,可以提供当前设备的IPsec和IKE配置内容。
(0)
暂无评论
已解决,在ipsec policy中增加配置local-address,ike profile中增加match remote certificate关联证书,不太清楚为什么,因为这两条都不是必选配置;
(0)
暂无评论
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
暂无评论