Contenido

Introducción

Este documento suministra una configuración de ejemplo para IPSec entre el Cliente de Hardware Remoto de PIX Easy VPN y el Servidor Easy VPN de PIX. La característica Easy VPN Remote para PIX se presentó en PIX versión 6.2 y también se considera cliente de hardware/cliente EzVPN. Servidor VPN de Cisco Easy se soporta en la versión 6.0 y posterior de PIX Software.

Consulte Ejemplo de Configuración de PIX/ASA 7.x Easy VPN con ASA 5500 como Servidor y PIX 506E como Cliente (NEM) para obtener más información sobre el mismo escenario en el que el dispositivo de seguridad se ejecuta con la versión de software 7.x.

Consulte PIX/ASA 7.x Easy VPN con ASA 5500 como servidor y Cisco 871 como ejemplo de configuración de Easy VPN remoto para obtener más información sobre un escenario similar en el que el router Cisco 871 actúa como Easy VPN remoto.

Refiérase a Ejemplo de Configuración de VPN Hardware Client en un PIX 501/506 Series Security Appliance con VPN 3000 Concentrator para obtener más información sobre un escenario similar donde el Cisco VPN 3000 Concentrator actúa como el Easy VPN Server.

Consulte Ejemplo de Configuración de Easy VPN Remote PIX 501/506 a un Router IOS en el Modo de Extensión de Red con Autenticación Extendida para obtener más información sobre un escenario similar donde el Router Cisco IOS® actúa como Servidor Easy VPN.

Prerequisites

Requirements

Asegúrese de cumplir estos requisitos antes de intentar esta configuración:

Componentes Utilizados

La información que contiene este documento se basa en las siguientes versiones de software y hardware.

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Convenciones

Consulte Convenciones de Consejos Técnicos de Cisco para obtener más información sobre las convenciones sobre documentos.

Configurar

En esta sección encontrará la información para configurar las funciones descritas en este documento.

Nota: Utilice la herramienta Command Lookup (sólo para clientes registrados) para obtener más información sobre los comandos utilizados en esta sección.

Diagrama de la red

En este documento, se utiliza esta configuración de red:

easyvpn-pix-01.gif

Configuraciones

En este documento, se utilizan estas configuraciones:

Servidor Easy VPN PIX
pix515#write terminal
Building configuration...
: Saved
:
PIX Version 6.3(1)

!--- Specify speed and duplex settings.

interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto shutdown
interface ethernet3 auto shutdown
interface ethernet4 auto shutdown
interface ethernet5 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security4
nameif ethernet3 intf3 security6
nameif ethernet4 intf4 security8
nameif ethernet5 intf5 security10
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pix515
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
names

!--- Specify split tunnelling access list and "nonat" access list.

access-list 101 permit ip 10.2.2.0 255.255.255.0 10.1.1.0 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
mtu intf2 1500
mtu intf3 1500
mtu intf4 1500
mtu intf5 1500

!--- Define IP address for the PIX's inside and outside interfaces.

ip address outside 172.16.2.1 255.255.255.0
ip address inside 10.2.2.1 255.255.255.0
no ip address intf2
no ip address intf3
no ip address intf4
no ip address intf5
ip audit info action alarm
ip audit attack action alarm
ip local pool ippool 10.3.3.1-10.3.3.254
no failover
failover timeout 0:00:00
failover poll 15
no failover ip address outside
no failover ip address inside
no failover ip address intf2
no failover ip address intf3
no failover ip address intf4
no failover ip address intf5
pdm history enable
arp timeout 14400

!--- Configure Network Address Translation (NAT)/ !--- Port Address Translation (PAT) for regular traffic, !--- as well as NAT for IPsec traffic.

global (outside) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 0.0.0.0 0.0.0.0 0 0

!--- Define the outside router as the default gateway. !--- Typically this is the IP address of your !--- Internet service provider's (ISP) router.

route outside 0.0.0.0 0.0.0.0 172.16.2.2 1

timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+ 
aaa-server RADIUS protocol radius 
aaa-server LOCAL protocol local 
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec

!--- Configure IPsec transform set and dynamic crypto map.

crypto ipsec transform-set myset esp-aes esp-md5-hmac 
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap

!--- Apply crypto map to the outside interface.

crypto map mymap interface outside

!--- Configure Phase 1 Internet Security Association !-- and Key Management Protocol (ISAKMP) parameters.

isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption aes
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400

!--- Configure VPNGroup parameters, to be sent down to the client.

vpngroup mygroup address-pool ippool
vpngroup mygroup dns-server 10.2.2.2
vpngroup mygroup wins-server 10.2.2.2
vpngroup mygroup default-domain cisco.com
vpngroup mygroup split-tunnel 101
vpngroup mygroup idle-time 1800
vpngroup mygroup password ********
vpngroup idle-time idle-time 1800
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:67106d7a5a3aa3da0caaeea93b9fc8d6
: end
[OK]
pix515#

Cliente de hardware remoto de PIX Easy VPN
pix501#write terminal
Building configuration...
: Saved
:
PIX Version 6.3(1)

!--- Specify speed and duplex settings.

interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pix501
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
names
pager lines 24
mtu outside 1500
mtu inside 1500

!--- Define IP address for the PIX's inside and outside interfaces.

ip address outside 172.16.1.1 255.255.255.0
ip address inside 10.1.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400

!--- Configure NAT for traffic that is not encrypted.

global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0

!--- Define the outside router as the default gateway. !--- Typically this is the IP address of your ISP's router.

route outside 0.0.0.0 0.0.0.0 172.16.1.2 1

timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+ 
aaa-server RADIUS protocol radius 
aaa-server LOCAL protocol local 
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0

!--- Define Easy VPN Remote parameters.

vpnclient server 172.16.2.1
vpnclient mode network-extension-mode
vpnclient vpngroup mygroup password ********

!--- Enable the VPN Client. !--- (This automatically initiates the IPSec tunnel to the server.)

vpnclient enable
terminal width 80
Cryptochecksum:b8242b410ad8e3b372018cd1cff77f91
: end
[OK]

Verificación

Use esta sección para confirmar que su configuración funciona correctamente.

La herramienta Output Interpreter Tool (clientes registrados solamente) (OIT) soporta ciertos comandos show. Utilice la OIT para ver un análisis del resultado del comando show.

Comandos show del servidor PIX Easy VPN y salida de ejemplo

Comandos show y ejemplo de PIX Easy VPN Remote Hardware Client

Troubleshoot

En esta sección encontrará información que puede utilizar para solucionar problemas de configuración.

Si ha configurado Easy VPN Remote Hardware Client y Easy VPN Server como se describe en este documento y aún tiene problemas, recopile el resultado de debug de cada PIX y el resultado de los comandos show para que el Centro de Asistencia Técnica (TAC) de Cisco lo analice. También consulte Solución de Problemas de PIX para Pasar el Tráfico de Datos en un Túnel IPSec Establecido o Solución de Problemas de Seguridad IP - Introducción y Uso de los Comandos debug. Habilitar depuración de IPSec en el PIX.

Aquí se muestran los comandos debug PIX y la salida de ejemplo.

Nota: Consulte Información Importante sobre Comandos Debug antes de utilizar los comandos debug.

Comandos del servidor Easy VPN

Ésta es una salida de ejemplo.

pix515(config)# 

!--- As soon as the vpnclient enable command !--- is issued on the remote client PIX, !--- the server receives an IKE negotiation request.
 
crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
OAK_AG exchange 
ISAKMP (0): processing SA payload. message ID = 0 

ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 256 
ISAKMP:      hash SHA 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 2 against priority 10 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 256 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 3 against priority 10 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 192 
ISAKMP:      hash SHA 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 4 against priority 10 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 192 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 5 against priority 10 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash SHA 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 6 against priority 10 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 7 against priority 10 policy 
ISAKMP:      encryption 3DES-CBC 
ISAKMP:      hash SHA 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 8 against priority 10 policy 
ISAKMP:      encryption 3DES-CBC 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 9 against priority 10 policy 
ISAKMP:      encryption DES-CBC 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      extended auth pre-share (init) 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 3 
ISAKMP (0): Checking ISAKMP transform 10 against priority 10 policy 
crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
OAK_AG exchange 
ISAKMP (0): processing HASH payload. message ID = 0 
ISAKMP (0): processing NOTIFY payload 24578 protocol 1 
        spi 0, message ID = 0 
ISAKMP (0): processing notify INITIAL_CONTACTIPSEC(key_engine): 
   got a queue event... 
IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP 
IPSEC(key_engine_delete_sas): delete all SAs shared with 172.16.1.1 

ISAKMP (0): processing vendor id payload 

ISAKMP (0): received xauth v6 vendor id 

ISAKMP (0): processing vendor id payload 

ISAKMP (0): remote peer supports dead peer detection 

ISAKMP (0): processing vendor id payload 

ISAKMP (0): speaking to another IOS box! 

ISAKMP (0): processing vendor id payload 

crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
ISAKMP_TRANSACTION exchange 
crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
OAK_QM exchange 
oakley_process_quick_mode: 
OAK_QM_IDLE 
ISAKMP (0): processing SA payload. message ID = 4788683 

ISAKMP : Checking IPSec proposal 1 

ISAKMP: transform 1, ESP_AES 
ISAKMP:   attributes in transform: 
ISAKMP:      encaps is 1 
ISAKMP:      SA life type in seconds 
ISAKMP:      SA life duration (basic) of 28800 
ISAKMP:      SA life type in kilobytes 
ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
ISAKMP:      authenticator is HMAC-SHA 
ISAKMP:      key length is 256IPSEC(validate_proposal): 
   transform proposal (prot 3, trans 12, hmac_alg 2) not supported 

ISAKMP (0): atts not acceptable. Next payload is 0 
ISAKMP : Checking IPSec proposal 2 

ISAKMP: transform 1, ESP_AES 
ISAKMP:   attributes in transform: 
ISAKMP:      encaps is 1 
ISAKMP:      SA life type in seconds 
ISAKMP:      SA life duration (basic) of 28800 
ISAKMP:      SA life type in kilobytes 
ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
ISAKMP:      authenticator is HMAC-MD5 
ISAKMP:      key length is 256IPSEC(validate_proposal): 
   transform proposal (prot 3, trans 12, hmac_alg 1) not supported 

ISAKMP (0): atts not acceptable. Next payload is 0 
ISAKMP : Checking IPSec proposal 3 

ISAKMP: transform 1, ESP_AES 
ISAKMP:   attributes in transform: 
ISAKMP:      encaps is 1 
ISAKMP:      SA life type in seconds 
ISAKMP:      SA life duration (basic) of 28800 
ISAKMP:      SA life type in kilobytes 
ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
ISAKMP:      authenticator is HMAC-SHA 
ISAKMP:      key length is 192IPSEC(validate_proposal): 
   transform proposal (prot 3, trans 12, hmac_alg 2) not supported 

ISAKMP (0): atts not acceptable. Next payload is 0 
ISAKMP : Checking IPSec proposal 4 

ISAKMP: transform 1, ESP_AES 
ISAKMP:   attributes in transform: 
ISAKMP:      encaps is 1 
ISAKMP:      SA life type in seconds 
ISAKMP:      SA life duration (basic) of 28800 
ISAKMP:      SA life type in kilobytes 
ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
ISAKMP:      authenticator is HMAC-MD5 
ISAKMP:      key length is 192IPSEC(validate_proposal): 
   transform proposal (prot 3, trans 12, hmac_alg 1) not supported 

ISAKMP (0): atts not acceptable. Next payload is 0 
ISAKMP : Checking IPSec proposal 5 

ISAKMP: transform 1, ESP_AES 
ISAKMP:   attributes in transform: 
ISAKMP:      encaps is 1 
ISAKMP:      SA life type in seconds 
ISAKMP:      SA life duration (basic) of 28800 
ISAKMP:      SA life type in kilobytes 
ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
ISAKMP:      authenticator is HMAC-SHA 
ISAKMP:      key length is 128IPSEC(validate_proposal): 
   transform proposal (prot 3, trans 12, hmac_alg 2) not supported 

ISAKMP (0): atts not acceptable. Next payload is 0 
ISAKMP : Checking IPSec proposal 6 

ISAKMP: transform 1, ESP_AES 
ISAKMP:   attributes in transform: 
ISAKMP:      encaps is 1 
ISAKMP:      SA life type in seconds 
ISAKMP:      SA life duration (basic) of 28800 
ISAKMP:      SA life type in kilobytes 
ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
ISAKMP:      authenticator is HMAC-MD5 
ISAKMP:      key length is 128 
ISAKMP (0): atts are acceptable.IPSEC(validate_proposal_request): 
   proposal part #1, 
  (key eng. msg.) dest= 172.16.2.1, src= 172.16.1.1, 
    dest_proxy= 10.2.2.0/255.255.255.0/0/0 (type=4), 
    src_proxy= 172.16.1.1/255.255.255.255/0/0 (type=1), 
    protocol= ESP, transform= esp-aes esp-md5-hmac , 
    lifedur= 0s and 0kb, 
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x4 

!--- Both PIXes accept the policy for IPsec.
 
ISAKMP (0): processing NONCE payload. message ID = 4788683 

ISAKMP (0): processing ID payload. message ID = 4788683 
ISAKMP (0): ID_IPV4_ADDR src 172.16.1.1 prot 0 port 0 
ISAKMP (0): processing ID payload. message ID = 4788683 
ISAKMP (0): ID_IPV4_ADDR_SUBNET dst 10.2.2.0/255.255.255.0 prot 0 
   port 0IPSEC(key_engine): got a queue event... 
IPSEC(spi_response): getting spi 0xf5720496(4117890198) for SA 
        from     172.16.1.1 to     172.16.2.1 for prot 3 

return status is IKMP_NO_ERROR 
crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
OAK_QM exchange 
oakley_process_quick_mode: 
OAK_QM_AUTH_AWAIT 
ISAKMP (0): Creating IPSec SAs 
        inbound SA from 172.16.1.1 to 172.16.2.1 
   (proxy 172.16.1.1 to 10.2.2.0) 
        has spi 4117890198 and conn_id 3 and flags 4 
        lifetime of 28800 seconds 
crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
ISAKMP (0): processing NOTIFY payload 36136 protocol 1 
        spi 0, message ID = 843197376 
ISAMKP (0): received DPD_R_U_THERE from peer 172.16.1.1 
ISAKMP (0): sending NOTIFY message 36137 protocol 1 
return status is IKMP_NO_ERR_NO_TRANS 
crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
ISAKMP (0): processing NOTIFY payload 36136 protocol 1 
        spi 0, message ID = 1985282089 
ISAMKP (0): received DPD_R_U_THERE from peer 172.16.1.1 
ISAKMP (0): sending NOTIFY message 36137 protocol 1 
return status is IKMP_NO_ERR_NO_TRANS 
crypto_isakmp_process_block:src:172.16.1.1, 
   dest:172.16.2.1 spt:500 dpt:500 
ISAKMP (0): processing NOTIFY payload 36136 protocol 1 
        spi 0, message ID = 1510977390 
ISAMKP (0): received DPD_R_U_THERE from peer 172.16.1.1 
ISAKMP (0): sending NOTIFY message 36137 protocol 1 
return status is IKMP_NO_ERR_NO_TRANS

Comandos de Easy VPN Remote Hardware Client

pix501(config)#vpnclient enable 
 (cIoSnAfKigM)P#  (0): ID payload 
        next-payload : 13 
        type         : 11 
        protocol     : 17 
        port         : 0 
        length       : 11 
ISAKMP (0): Total payload length: 15 
ISAKMP (0:0): sending NAT-T vendor ID - rev 2 & 3 
ISAKMP (0): beginning Aggressive Mode exchange 
crypto_isakmp_process_block:src:172.16.2.1, 
   dest:172.16.1.1 spt:500 dpt:500 
OAK_AG exchange 
ISAKMP (0): processing SA payload. message ID = 0 

ISAKMP (0): Checking ISAKMP transform 1 against priority 65001 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65002 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65003 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65004 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65005 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65006 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65007 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65008 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP (0): atts are not acceptable. Next payload is 0 
ISAKMP (0): Checking ISAKMP transform 1 against priority 65009 policy 
ISAKMP:      encryption AES-CBC 
ISAKMP:      keylength of 128 
ISAKMP:      hash MD5 
ISAKMP:      default group 2 
ISAKMP:      auth pre-share 
ISAKMP:      life type in seconds 
ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80 
ISAKMP : attributes being requested 

crypto_isakmp_process_block:src:172.16.2.1, 
   dest:172.16.1.1 spt:500 dpt:500 
ISAKMP (0): beginning Quick Mode exchange, 
   M-ID of 1112046058:424879eaIPSEC(key_engine): got a queue event... 
IPSEC(spi_response): getting spi 0x274d3063(659370083) for SA 
        from     172.16.2.1 to     172.16.1.1 for prot 3 

crypto_isakmp_process_block:src:172.16.2.1, 
   dest:172.16.1.1 spt:500 dpt:500 
OAK_QM exchange 
oakley_process_quick_mode: 
OAK_QM_IDLE 
ISAKMP (0): processing SA payload. message ID = 1112046058 

ISAKMP : Checking IPSec proposal 1 

ISAKMP: transform 1, ESP_AES 
ISAKMP:   attributes in transform: 
ISAKMP:      encaps is 1 
ISAKMP:      SA life type in seconds 
ISAKMP:      SA life duration (basic) of 28800 
ISAKMP:      SA life type in kilobytes 
ISAKMP:      SA life duration (VPI) of  0x0 0x46 0x50 0x0 
ISAKMP:      authenticator is HMAC-MD5 
ISAKMP:      key length is 128 
ISAKMP (0): atts are acceptable.IPSEC(validate_proposal_request): 
   proposal part #1, 
  (key eng. msg.) dest= 172.16.2.1, src= 172.16.1.1, 
    dest_proxy= 10.2.2.0/255.255.255.0/0/0 (type=4), 
    src_proxy= 172.16.1.1/255.255.255.255/0/0 (type=1), 
    protocol= ESP, transform= esp-aes esp-md5-hmac , 
    lifedur= 0s and 0kb, 
    spi= 0x0(0), conn_id= 0, keysize= 128, flags= 0x4 

ISAKMP (0): processing NONCE payload. message ID = 1112046058 

ISAKMP (0): processing ID payload. message ID = 1112046058 
ISAKMP (0): processing ID payload. message ID = 1112046058 
ISAKMP (0): Creating IPSec SAs 
        inbound SA from 172.16.2.1 to 172.16.1.1 
   (proxy 10.2.2.0 to 172.16.1.1) 
        has spi 659370083 and conn_id 2 and flags 4 
        lifetime of 28800 seconds 
        lifetime of 4608000 kilobytes 
        outbound SA from 172.16.1.1 to 172.16.2.1 
   (proxy 172.16.1.1 to 10.2.2.0) 
        has spi 264316759 and conn_id 1 and flags 4 
        lifetime of 28800 seconds 
        lifetime of 4608000 kilobytesIPSEC(key_engine): 
   got a queue event... 
IPSEC(initialize_sas): , 
  (key eng. msg.) dest= 172.16.1.1, src= 172.16.2.1, 
    dest_proxy= 172.16.1.1/255.255.255.255/0/0 (type=1), 
    src_proxy= 10.2.2.0/255.255.255.0/0/0 (type=4), 
    protocol= ESP, transform= esp-aes esp-md5-hmac , 
    lifedur= 28800s and 4608000kb, 
    spi= 0x274d3063(659370083), conn_id= 2, keysize= 128, flags= 0x4 
IPSEC(initialize_sas): , 
  (key eng. msg.) src= 172.16.1.1, dest= 172.16.2.1, 
    src_proxy= 172.16.1.1/255.255.255.255/0/0 (type=1), 
    dest_proxy= 10.2.2.0/255.255.255.0/0/0 (type=4), 
    protocol= ESP, transform= esp-aes esp-md5-hmac , 
    lifedur= 28800s and 4608000kb, 
    spi= 0xfc12757(264316759), conn_id= 1, keysize= 128, flags= 0x4 

VPN Peer: IPSEC: Peer ip:172.16.2.1/500 Ref cnt incremented to:2 
   Total VPN Peers:1 
VPN Peer: IPSEC: Peer ip:172.16.2.1/500 Ref cnt incremented to:3 
   Total VPN Peers:1 
return status is IKMP_NO_ERROR 
pix501(config)# 
pix501(config)# 
ISAKMP (0): sending NOTIFY message 36136 protocol 1 
crypto_isakmp_process_block:src:172.16.2.1, 
   dest:172.16.1.1 spt:500 dpt:500 
ISAKMP (0): processing NOTIFY payload 36137 protocol 1 
        spi 0, message ID = 136860646n 
ISAMKP (0): received DPD_R_U_THERE_ACK from peer 172.16.2.1
pix501(config)#vpnclient enable 
pix501(config)# 505: VPNC CFG: transform set unconfig attempt done 
506: VPNC CLI: no isakmp keepalive 10 
507: VPNC CLI: no isakmp nat-traversal 20 
508: VPNC CFG: IKE unconfig successful 
509: VPNC CLI: no crypto map _vpnc_cm 
510: VPNC CFG: crypto map deletion attempt done 
511: VPNC CFG: crypto unconfig successful 
512: VPNC CLI: no global (outside) 65001 
513: VPNC CLI: no nat (inside) 0 access-list _vpnc_acl 
514: VPNC CFG: nat unconfig attempt failed 
515: VPNC CLI: no http 10.1.1.1 255.255.255.0 inside 
516: VPNC CLI: no http server enable 
517: VPNC CLI: no access-list _vpnc_acl 
518: VPNC CFG: ACL deletion attempt failed 
519: VPNC CLI: no crypto map _vpnc_cm interface outside 
520: VPNC CFG: crypto map de/attach failed 
521: VPNC CLI: no sysopt connection permit-ipsec 
522: VPNC CLI: sysopt connection permit-ipsec 
523: VPNC CFG: transform sets configured 
524: VPNC CFG: crypto config successful 
525: VPNC CLI: isakmp keepalive 10 
526: VPNC CLI: isakmp nat-traversal 20 
527: VPNC CFG: IKE config successful 
528: VPNC CLI: http 10.1.1.1 255.255.255.0 inside 
529: VPNC CLI: http server enable 
530: VPNC CLI: no access-list _vpnc_acl 
531: VPNC CFG: ACL deletion attempt failed 
532: VPNC CLI: access-list _vpnc_acl 
   permit ip host 172.16.1.1 host 172.16.2.1 
533: VPNC CLI: crypto map _vpnc_cm 10 match address _vpnc_acl 
534: VPNC CFG: crypto map acl update successful 
535: VPNC CLI: no crypto map _vpnc_cm interface outside 
536: VPNC CLI: crypto map _vpnc_cm interface outside 
537: VPNC INF: IKE trigger request done 
538: VPNC INF: Constructing policy download req 
539: VPNC INF: Packing attributes for policy request 
540: VPNC INF: Attributes being requested 
541: VPNC ATT: ALT_DEF_DOMAIN: cisco.com 
542: VPNC ATT: INTERNAL_IP4_NBNS: 10.2.2.2 
543: VPNC ATT: INTERNAL_IP4_DNS: 10.2.2.2 
544: VPNC ATT: ALT_SPLIT_INCLUDE 
545: VPNC INF:  10.2.2.0/255.255.255.0 
546: VPNC ATT: ALT_PFS: 0 
547: VPNC ATT: ALT_CFG_SEC_UNIT: 0 
548: VPNC ATT: ALT_CFG_USER_AUTH: 0 
549: VPNC CLI: no access-list _vpnc_acl 
550: VPNC CLI: access-list _vpnc_acl 
   permit ip 10.1.1.0 255.255.255.0 10.2.2.0 255.255.255.0 
551: VPNC CLI: access-list _vpnc_acl 
   permit ip host 172.16.1.1 10.2.2.0 255.255.255.0 
552: VPNC CFG: _vpnc_acl ST define done 
553: VPNC CFG: Split DNS config attempt done 
554: VPNC CLI: crypto map _vpnc_cm 10 match address _vpnc_acl 
555: VPNC CFG: crypto map acl update successful 
556: VPNC CLI: no crypto map _vpnc_cm interface outside 
557: VPNC CLI: crypto map _vpnc_cm interface outside 
558: VPNC CLI: no global (outside) 65001 
559: VPNC CLI: no nat (inside) 0 access-list _vpnc_acl 
560: VPNC CFG: nat unconfig attempt failed 
561: VPNC CLI: nat (inside) 0 access-list _vpnc_acl 
562: VPNC INF: IKE trigger request done

Información Relacionada