<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with IPSEC tunnel between Cisco and MSR930 in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/problem-with-ipsec-tunnel-between-cisco-and-msr930/m-p/6934687#M826</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Have you managed to resolve the issue?&lt;/P&gt;&lt;P&gt;If so, would you please share details?&lt;/P&gt;&lt;P&gt;I have something kind of similar between MSR and CISCO.&lt;/P&gt;&lt;P&gt;I look forward to hearing from you.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Wojtek&lt;/P&gt;</description>
    <pubDate>Wed, 25 Jan 2017 08:23:06 GMT</pubDate>
    <dc:creator>VoytekG</dc:creator>
    <dc:date>2017-01-25T08:23:06Z</dc:date>
    <item>
      <title>Problem with IPSEC tunnel between Cisco and MSR930</title>
      <link>https://community.hpe.com/t5/security-e-series/problem-with-ipsec-tunnel-between-cisco-and-msr930/m-p/6871123#M399</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I need some assistance with configuring VPN between Cisco ASA and HP MSR930.&lt;/P&gt;&lt;P&gt;The&amp;nbsp;Cisco ASA is in control of 3rd party and I receive only limted support from thier side. They've told me that they see "qmfs errors" when trying to establish the IPSEC tunnel&lt;/P&gt;&lt;P&gt;This is the relevant part of the MSR configuration:&lt;/P&gt;&lt;P&gt;=================&lt;BR /&gt;#&lt;BR /&gt;&amp;nbsp;nat address-group 1 192.168.131.1 192.168.131.1&lt;BR /&gt;#&lt;BR /&gt;acl number 3001&lt;BR /&gt;&amp;nbsp;description IPSEC&lt;BR /&gt;&amp;nbsp;rule 0 permit ip source 192.168.131.0 0.0.0.255 destination 192.168.100.0 0.0.0.255&lt;BR /&gt;acl number 3003 name NAT&lt;BR /&gt;&amp;nbsp;description NAT&lt;BR /&gt;&amp;nbsp;rule 0 permit ip source 100.64.4.20 0 destination 192.168.100.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;rule 2 deny ip&lt;BR /&gt;#&lt;BR /&gt;ike proposal 1&lt;BR /&gt;&amp;nbsp;encryption-algorithm aes-cbc 256&lt;BR /&gt;&amp;nbsp;dh group2&lt;BR /&gt;&amp;nbsp;sa duration 28800&lt;BR /&gt;#&lt;BR /&gt;ike peer mtel&lt;BR /&gt;&amp;nbsp;pre-shared-key cipher XXXXXXXXXXXXXXXXXXXX&lt;BR /&gt;&amp;nbsp;remote-address 172.21.32.9&lt;BR /&gt;&amp;nbsp;local-address 172.21.32.10&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set mtel&lt;BR /&gt;&amp;nbsp;encapsulation-mode tunnel&lt;BR /&gt;&amp;nbsp;transform esp&lt;BR /&gt;&amp;nbsp;esp authentication-algorithm sha2-256&lt;BR /&gt;&amp;nbsp;esp encryption-algorithm aes-cbc-256&lt;BR /&gt;#&lt;BR /&gt;ipsec policy mtel 1 isakmp&lt;BR /&gt;&amp;nbsp;connection-name bs-mtel&lt;BR /&gt;&amp;nbsp;security acl 3001&lt;BR /&gt;&amp;nbsp;pfs dh-group2&lt;BR /&gt;&amp;nbsp;ike-peer mtel&lt;BR /&gt;&amp;nbsp;transform-set mtel&lt;BR /&gt;&amp;nbsp;sa duration time-based 3600&lt;BR /&gt;#&lt;BR /&gt;interface LoopBack1&lt;BR /&gt;&amp;nbsp;description IPSEC IAB NW. NAT Through here.&lt;BR /&gt;&amp;nbsp;bandwidth 5000&lt;BR /&gt;&amp;nbsp;ip address 192.68.131.1 255.255.255.255&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet0/0.2766&lt;BR /&gt;&amp;nbsp;vlan-type dot1q vid 2766&lt;BR /&gt;&amp;nbsp;nat outbound 3003 address-group 1&lt;BR /&gt;&amp;nbsp;bandwidth 5000&lt;BR /&gt;&amp;nbsp;ip address 172.21.32.10 255.255.255.248&lt;BR /&gt;&amp;nbsp;ipsec policy mtel&lt;BR /&gt;#&lt;BR /&gt;&amp;nbsp;ip route-static 192.168.100.0 255.255.255.0 GigabitEthernet0/0.2766 172.21.32.9&lt;BR /&gt;================================&lt;/P&gt;&lt;P&gt;This is the debug log:&lt;/P&gt;&lt;P&gt;===============================&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*Jun 21 19:00:58:957 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp; Entering IPsec NAT bypass pross.&lt;BR /&gt;*Jun 21 19:00:58:958 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp;ipsec nat bypass is not enable.&lt;BR /&gt;*Jun 21 19:00:58:958 2016 MSR930-3 NAT/7/debug:&lt;BR /&gt;(GigabitEthernet0/0.2766-out :)Pro : ICMP&lt;BR /&gt;(&amp;nbsp;&amp;nbsp;&amp;nbsp; 100.64.4.20:&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 - 192.168.100.150:&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) ------&amp;gt;&lt;BR /&gt;(&amp;nbsp; 192.168.131.1:12308 - 192.168.100.150:&amp;nbsp;&amp;nbsp;&amp;nbsp; 2)&lt;BR /&gt;*Jun 21 19:00:58:959 2016 MSR930-3 IPSEC/7/DBG: IPsec_SA:ipsec acquire sa, use ike peer name: "mtel".&lt;BR /&gt;*Jun 21 19:00:58:959 2016 MSR930-3 IPSEC/7/DBG: IPSEC_Negotiate:IPSec drop packet! Notify IKE to negotiate SA for IPsec policy: mtel-1&lt;BR /&gt;*Jun 21 19:00:58:960 2016 MSR930-3 IKE/7/DEBUG: IKE receive acquire SA request, IKE peer name:mtel.&lt;BR /&gt;*Jun 21 19:00:58:961 2016 MSR930-3 IKE/7/DEBUG: Connection name is 172.21.32.10,172.21.32.9,500,,0,1,1&lt;BR /&gt;*Jun 21 19:00:58:961 2016 MSR930-3 IKE/7/DEBUG: Check connection: SA for 172.21.32.10,172.21.32.9,500,,0,1,1 missing&lt;BR /&gt;*Jun 21 19:00:58:962 2016 MSR930-3 IKE/7/DEBUG: exchange lookup :name = 172.21.32.10,172.21.32.9,500,,0,1,1 phase = 2&lt;BR /&gt;*Jun 21 19:00:58:962 2016 MSR930-3 IKE/7/DEBUG: exchange lookup :name = 172.21.32.10,172.21.32.9,500,,0,0,0 phase = 1&lt;BR /&gt;*Jun 21 19:00:58:962 2016 MSR930-3 IKE/7/DEBUG: exchange setup(I): 8ffb8d0&lt;BR /&gt;*Jun 21 19:00:58:963 2016 MSR930-3 IKE/7/DEBUG: create udp resource:name = 172.21.32.10,172.21.32.9,500,,0,0,0.&lt;BR /&gt;*Jun 21 19:00:58:963 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required SA&lt;BR /&gt;*Jun 21 19:00:58:963 2016 MSR930-3 IKE/7/DEBUG: exchange state machine(I): finished step 0, advancing...&lt;BR /&gt;*Jun 21 19:00:58:964 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp; Entering IPsec NAT bypass pross.&lt;BR /&gt;*Jun 21 19:00:58:964 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp;ipsec nat bypass is not enable.&lt;BR /&gt;*Jun 21 19:00:58:973 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required SA&lt;BR /&gt;*Jun 21 19:00:58:973 2016 MSR930-3 IKE/7/DEBUG: exchange state machine: unexpected payload VENDOR&lt;BR /&gt;*Jun 21 19:00:58:973 2016 MSR930-3 IKE/7/DEBUG: exchange state machine(I): finished step 1, advancing...&lt;BR /&gt;*Jun 21 19:00:58:974 2016 MSR930-3 IKE/7/DEBUG:&lt;BR /&gt;IKE_DPD: send VID : afcad713 68a1f1c9 6b8696fc 77570100 (DPD)&lt;BR /&gt;*Jun 21 19:00:58:974 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required KEY_EXCH&lt;BR /&gt;*Jun 21 19:00:58:974 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required NONCE&lt;BR /&gt;*Jun 21 19:00:58:975 2016 MSR930-3 IKE/7/DEBUG: exchange state machine(I): finished step 2, advancing...&lt;BR /&gt;*Jun 21 19:00:58:975 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp; Entering IPsec NAT bypass pross.&lt;BR /&gt;*Jun 21 19:00:58:976 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp;ipsec nat bypass is not enable.&lt;BR /&gt;*Jun 21 19:00:58:984 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required KEY_EXCH&lt;BR /&gt;*Jun 21 19:00:58:985 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required NONCE&lt;BR /&gt;*Jun 21 19:00:58:985 2016 MSR930-3 IKE/7/DEBUG: exchange state machine: unexpected payload VENDOR&lt;BR /&gt;*Jun 21 19:00:58:985 2016 MSR930-3 IKE/7/DEBUG: exchange state machine(I): finished step 3, advancing...&lt;BR /&gt;*Jun 21 19:00:58:986 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required ID&lt;BR /&gt;*Jun 21 19:00:58:986 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required AUTH&lt;BR /&gt;*Jun 21 19:00:58:986 2016 MSR930-3 IKE/7/DEBUG: exchange state machine(I): finished step 4, advancing...&lt;BR /&gt;*Jun 21 19:00:58:987 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp; Entering IPsec NAT bypass pross.&lt;BR /&gt;*Jun 21 19:00:58:987 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp;ipsec nat bypass is not enable.&lt;BR /&gt;*Jun 21 19:00:58:997 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required ID&lt;BR /&gt;*Jun 21 19:00:58:997 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required AUTH&lt;BR /&gt;*Jun 21 19:00:58:998 2016 MSR930-3 IKE/7/DEBUG:&lt;BR /&gt;IKE_DPD: PF_KEY notify ipsec to update dpd recv_time.&lt;BR /&gt;*Jun 21 19:00:58:998 2016 MSR930-3 IKE/7/DEBUG: exchange setup(I): 8ffb6b0&lt;BR /&gt;*Jun 21 19:00:58:998 2016 MSR930-3 IPSEC/7/DBG: Create temp SA(New ESP)...&lt;BR /&gt;*Jun 21 19:00:58:999 2016 MSR930-3 IPSEC/7/DBG: Src:172.21.32.9 Dst:172.21.32.10 SPI:1970354878(0x75713abe)&lt;BR /&gt;*Jun 21 19:00:58:999 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required HASH&lt;BR /&gt;*Jun 21 19:00:58:999 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required SA&lt;BR /&gt;*Jun 21 19:00:59:000 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required NONCE&lt;BR /&gt;*Jun 21 19:00:59:000 2016 MSR930-3 IKE/7/DEBUG: exchange state machine(I): finished step 0, advancing...&lt;BR /&gt;*Jun 21 19:00:59:000 2016 MSR930-3 IKE/7/DEBUG: exchange release: freeing exchange 8ffb8d0&lt;BR /&gt;*Jun 21 19:00:59:001 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp; Entering IPsec NAT bypass pross.&lt;BR /&gt;*Jun 21 19:00:59:001 2016 MSR930-3 IPSEC/7/DBG:&lt;BR /&gt;&amp;nbsp;ipsec nat bypass is not enable.&lt;BR /&gt;*Jun 21 19:00:59:004 2016 MSR930-3 IKE/7/DEBUG: exchange setup(R): 8ffc590&lt;BR /&gt;*Jun 21 19:00:59:004 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required INFO&lt;BR /&gt;*Jun 21 19:00:59:005 2016 MSR930-3 IKE/7/DEBUG: exchange release: freeing exchange 8ffc590&lt;BR /&gt;*Jun 21 19:00:59:005 2016 MSR930-3 IKE/7/DEBUG: exchange setup(R): 8ffb8d0&lt;BR /&gt;*Jun 21 19:00:59:005 2016 MSR930-3 IKE/7/DEBUG: exchange check: checking for required INFO&lt;BR /&gt;*Jun 21 19:00:59:006 2016 MSR930-3 IKE/7/DEBUG:&lt;BR /&gt;IKE_DPD: isakmp sa name : 172.21.32.10,172.21.32.9,500,,0&lt;BR /&gt;*Jun 21 19:00:59:006 2016 MSR930-3 IKE/7/DEBUG:&lt;BR /&gt;IKE_DPD: PF_KEY notify ipsec to update dpd recv_time.&lt;BR /&gt;*Jun 21 19:00:59:006 2016 MSR930-3 IKE/7/DEBUG:&lt;BR /&gt;IKE_DPD: release ike dpd structure&lt;BR /&gt;*Jun 21 19:00:59:007 2016 MSR930-3 IPSEC/7/DBG: IPsec_SA:Deleting IPsec SA via pfkeyv2 socket.&lt;BR /&gt;*Jun 21 19:00:59:007 2016 MSR930-3 IPSEC/7/DBG: Deleting SA...&lt;BR /&gt;*Jun 21 19:00:59:008 2016 MSR930-3 IPSEC/7/DBG: Src:172.21.32.9 Dst:172.21.32.10 SPI:1970354878(0x75713abe)&lt;BR /&gt;*Jun 21 19:00:59:008 2016 MSR930-3 IPSEC/7/DBG: Done.&lt;BR /&gt;*Jun 21 19:00:59:008 2016 MSR930-3 IPSEC/7/DBG: Putting TDB 90498d0 into trash.&lt;BR /&gt;*Jun 21 19:00:59:009 2016 MSR930-3 IKE/7/DEBUG: exchange release: freeing exchange 8ffb6b0&lt;BR /&gt;*Jun 21 19:00:59:009 2016 MSR930-3 IKE/7/DEBUG: exchange release: freeing exchange 8ffb8d0&lt;BR /&gt;*Jun 21 19:00:59:828 2016 MSR930-3 IPSEC/7/DBG: Deleting Trash TDB 90498d0&lt;/P&gt;&lt;P&gt;===============================&lt;/P&gt;&lt;P&gt;Hope someone can provide assistance.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 19:21:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/problem-with-ipsec-tunnel-between-cisco-and-msr930/m-p/6871123#M399</guid>
      <dc:creator>Nikolay_Petrov</dc:creator>
      <dc:date>2016-06-21T19:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with IPSEC tunnel between Cisco and MSR930</title>
      <link>https://community.hpe.com/t5/security-e-series/problem-with-ipsec-tunnel-between-cisco-and-msr930/m-p/6934687#M826</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Have you managed to resolve the issue?&lt;/P&gt;&lt;P&gt;If so, would you please share details?&lt;/P&gt;&lt;P&gt;I have something kind of similar between MSR and CISCO.&lt;/P&gt;&lt;P&gt;I look forward to hearing from you.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Wojtek&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2017 08:23:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/problem-with-ipsec-tunnel-between-cisco-and-msr930/m-p/6934687#M826</guid>
      <dc:creator>VoytekG</dc:creator>
      <dc:date>2017-01-25T08:23:06Z</dc:date>
    </item>
  </channel>
</rss>

