<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSEC Problem between MSR2003 Router and VSR1008 Router in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/ipsec-problem-between-msr2003-router-and-vsr1008-router/m-p/6907463#M679</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;im having trouble setting up ipsec tunnel between two routers, vsr router is working behind one to one nat and&amp;nbsp;&lt;/P&gt;&lt;P&gt;when i checked the ip i can reach it, so its working correctly, but its unable to establish the ipsec session&lt;/P&gt;&lt;P&gt;any help would be appriciated.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Erdem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MSR Configuration&lt;/P&gt;&lt;PRE&gt;#
interface GigabitEthernet2/0/1
 port link-mode route
 ip address 91.93.188.206 255.255.255.248
 ospf timer hello 2
 ospf timer dead 10
 ospf network-type p2mp unicast
 ospf timer poll 2
 ospf 2 area 0.0.0.1
 ipsec apply policy msr
#
acl advanced 3000 match-order auto
 rule 0 permit ip source 172.16.101.0 0.0.0.255 destination 10.142.20.0 0.0.0.255
 rule 1 permit ip source 172.16.102.0 0.0.0.255 destination 10.142.20.0 0.0.0.255
#
 ipsec anti-replay window 1024
 ipsec sa global-duration traffic-based 86400
 ipsec sa idle-time 120
#
ipsec transform-set msr
 esp encryption-algorithm 3des-cbc 
 esp authentication-algorithm md5 
#
ipsec policy-template msr 1
 transform-set msr 
 security acl 3000 
 remote-address 88.238.51.202
 ike-profile msr
 reverse-route dynamic
 reverse-route preference 10
 reverse-route tag 100
#
ipsec policy msr 1 isakmp template msr
#
 ike identity address 91.93.188.206
 ike nat-keepalive 5
#
ike profile msr
 keychain msr
 exchange-mode aggressive
 local-identity address 91.93.188.206
 match remote identity address 88.238.51.202 255.255.255.255
 proposal 1 
#
ike proposal 1
 encryption-algorithm 3des-cbc
 dh group2
 authentication-algorithm md5
#
ike keychain msr
 pre-shared-key address 88.238.51.202 255.255.255.255 key cipher $c$3$p/GPavNSjkBGsE89MMJhRJOsKq+vhJC85xz2
#
ip route-static 10.142.20.0 24 GigabitEthernet2/0/1 88.238.51.202
#&lt;/PRE&gt;&lt;P&gt;VSR Configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;#&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt; port link-mode route&lt;BR /&gt; ip address 10.142.20.6 255.255.255.0&lt;BR /&gt; ospf timer hello 2&lt;BR /&gt; ospf timer dead 10&lt;BR /&gt; ospf network-type p2mp unicast&lt;BR /&gt; ospf dr-priority 2&lt;BR /&gt; ospf timer poll 2&lt;BR /&gt; ospf 2 area 0.0.0.1&lt;BR /&gt; ipsec apply policy vsr&lt;BR /&gt;#&lt;BR /&gt;acl advanced 3000 match-order auto&lt;BR /&gt; rule 0 permit ip source 10.142.20.0 0.0.0.255 destination 172.16.101.0 0.0.0.255&lt;BR /&gt; rule 1 permit ip source 10.142.20.0 0.0.0.255 destination 172.16.102.0 0.0.0.255&lt;BR /&gt;#&lt;BR /&gt; ipsec anti-replay window 1024&lt;BR /&gt; ipsec sa global-duration traffic-based 86400&lt;BR /&gt; ipsec sa idle-time 120&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set vsr&lt;BR /&gt; esp encryption-algorithm 3des-cbc &lt;BR /&gt; esp authentication-algorithm md5 &lt;BR /&gt;#&lt;BR /&gt;ipsec policy-template vsr 1&lt;BR /&gt; transform-set vsr &lt;BR /&gt; security acl 3000 &lt;BR /&gt; remote-address 91.93.188.206&lt;BR /&gt; ike-profile vsr&lt;BR /&gt; reverse-route dynamic&lt;BR /&gt; reverse-route preference 10&lt;BR /&gt; reverse-route tag 100&lt;BR /&gt;#&lt;BR /&gt;ipsec policy vsr 1 isakmp template vsr&lt;BR /&gt;#&lt;BR /&gt; ike identity address 88.238.51.202&lt;BR /&gt; ike nat-keepalive 5&lt;BR /&gt;#&lt;BR /&gt;ike profile vsr&lt;BR /&gt; keychain vsr&lt;BR /&gt; exchange-mode aggressive&lt;BR /&gt; local-identity address 88.238.51.202&lt;BR /&gt; match remote identity address 91.93.188.206 255.255.255.255&lt;BR /&gt; proposal 1 &lt;BR /&gt;#&lt;BR /&gt;ike proposal 1&lt;BR /&gt; encryption-algorithm 3des-cbc&lt;BR /&gt; dh group2&lt;BR /&gt; authentication-algorithm md5&lt;BR /&gt;#&lt;BR /&gt;ike keychain vsr&lt;BR /&gt; pre-shared-key address 91.93.188.206 255.255.255.255 key cipher $c$3$p/GPavNSjkBGsE89MMJhRJOsKq+vhJC85xz2&lt;BR /&gt;#&lt;BR /&gt;ip route-static 10.142.20.0 24 GigabitEthernet2/0/1 88.238.51.202&lt;BR /&gt;#&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2016 18:43:40 GMT</pubDate>
    <dc:creator>eozturk01</dc:creator>
    <dc:date>2016-10-13T18:43:40Z</dc:date>
    <item>
      <title>IPSEC Problem between MSR2003 Router and VSR1008 Router</title>
      <link>https://community.hpe.com/t5/security-e-series/ipsec-problem-between-msr2003-router-and-vsr1008-router/m-p/6907463#M679</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;im having trouble setting up ipsec tunnel between two routers, vsr router is working behind one to one nat and&amp;nbsp;&lt;/P&gt;&lt;P&gt;when i checked the ip i can reach it, so its working correctly, but its unable to establish the ipsec session&lt;/P&gt;&lt;P&gt;any help would be appriciated.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Erdem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MSR Configuration&lt;/P&gt;&lt;PRE&gt;#
interface GigabitEthernet2/0/1
 port link-mode route
 ip address 91.93.188.206 255.255.255.248
 ospf timer hello 2
 ospf timer dead 10
 ospf network-type p2mp unicast
 ospf timer poll 2
 ospf 2 area 0.0.0.1
 ipsec apply policy msr
#
acl advanced 3000 match-order auto
 rule 0 permit ip source 172.16.101.0 0.0.0.255 destination 10.142.20.0 0.0.0.255
 rule 1 permit ip source 172.16.102.0 0.0.0.255 destination 10.142.20.0 0.0.0.255
#
 ipsec anti-replay window 1024
 ipsec sa global-duration traffic-based 86400
 ipsec sa idle-time 120
#
ipsec transform-set msr
 esp encryption-algorithm 3des-cbc 
 esp authentication-algorithm md5 
#
ipsec policy-template msr 1
 transform-set msr 
 security acl 3000 
 remote-address 88.238.51.202
 ike-profile msr
 reverse-route dynamic
 reverse-route preference 10
 reverse-route tag 100
#
ipsec policy msr 1 isakmp template msr
#
 ike identity address 91.93.188.206
 ike nat-keepalive 5
#
ike profile msr
 keychain msr
 exchange-mode aggressive
 local-identity address 91.93.188.206
 match remote identity address 88.238.51.202 255.255.255.255
 proposal 1 
#
ike proposal 1
 encryption-algorithm 3des-cbc
 dh group2
 authentication-algorithm md5
#
ike keychain msr
 pre-shared-key address 88.238.51.202 255.255.255.255 key cipher $c$3$p/GPavNSjkBGsE89MMJhRJOsKq+vhJC85xz2
#
ip route-static 10.142.20.0 24 GigabitEthernet2/0/1 88.238.51.202
#&lt;/PRE&gt;&lt;P&gt;VSR Configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;#&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt; port link-mode route&lt;BR /&gt; ip address 10.142.20.6 255.255.255.0&lt;BR /&gt; ospf timer hello 2&lt;BR /&gt; ospf timer dead 10&lt;BR /&gt; ospf network-type p2mp unicast&lt;BR /&gt; ospf dr-priority 2&lt;BR /&gt; ospf timer poll 2&lt;BR /&gt; ospf 2 area 0.0.0.1&lt;BR /&gt; ipsec apply policy vsr&lt;BR /&gt;#&lt;BR /&gt;acl advanced 3000 match-order auto&lt;BR /&gt; rule 0 permit ip source 10.142.20.0 0.0.0.255 destination 172.16.101.0 0.0.0.255&lt;BR /&gt; rule 1 permit ip source 10.142.20.0 0.0.0.255 destination 172.16.102.0 0.0.0.255&lt;BR /&gt;#&lt;BR /&gt; ipsec anti-replay window 1024&lt;BR /&gt; ipsec sa global-duration traffic-based 86400&lt;BR /&gt; ipsec sa idle-time 120&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set vsr&lt;BR /&gt; esp encryption-algorithm 3des-cbc &lt;BR /&gt; esp authentication-algorithm md5 &lt;BR /&gt;#&lt;BR /&gt;ipsec policy-template vsr 1&lt;BR /&gt; transform-set vsr &lt;BR /&gt; security acl 3000 &lt;BR /&gt; remote-address 91.93.188.206&lt;BR /&gt; ike-profile vsr&lt;BR /&gt; reverse-route dynamic&lt;BR /&gt; reverse-route preference 10&lt;BR /&gt; reverse-route tag 100&lt;BR /&gt;#&lt;BR /&gt;ipsec policy vsr 1 isakmp template vsr&lt;BR /&gt;#&lt;BR /&gt; ike identity address 88.238.51.202&lt;BR /&gt; ike nat-keepalive 5&lt;BR /&gt;#&lt;BR /&gt;ike profile vsr&lt;BR /&gt; keychain vsr&lt;BR /&gt; exchange-mode aggressive&lt;BR /&gt; local-identity address 88.238.51.202&lt;BR /&gt; match remote identity address 91.93.188.206 255.255.255.255&lt;BR /&gt; proposal 1 &lt;BR /&gt;#&lt;BR /&gt;ike proposal 1&lt;BR /&gt; encryption-algorithm 3des-cbc&lt;BR /&gt; dh group2&lt;BR /&gt; authentication-algorithm md5&lt;BR /&gt;#&lt;BR /&gt;ike keychain vsr&lt;BR /&gt; pre-shared-key address 91.93.188.206 255.255.255.255 key cipher $c$3$p/GPavNSjkBGsE89MMJhRJOsKq+vhJC85xz2&lt;BR /&gt;#&lt;BR /&gt;ip route-static 10.142.20.0 24 GigabitEthernet2/0/1 88.238.51.202&lt;BR /&gt;#&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 18:43:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ipsec-problem-between-msr2003-router-and-vsr1008-router/m-p/6907463#M679</guid>
      <dc:creator>eozturk01</dc:creator>
      <dc:date>2016-10-13T18:43:40Z</dc:date>
    </item>
  </channel>
</rss>

