[Openswan Users] openswan to Cisco ASA. INVALID_COOKIE error.

Ryan McLeod r.mcleod20 at gmail.com
Wed Jul 7 15:41:08 EDT 2010


I've got openswan installed on a virtual machine of ubuntu, ip:
192.168.92.128. It runs on a windows machine with an ip of 200.200.200.1,
which is connected by straight through cable to a Cisco ASA (200.200.200.2,
and 192.168.1.0 for its internal network). So this is just an internal setup
for testing some vpns with the cisco. I'm getting an error when trying to
connect open swan to the asa as a site-to-site vpn.

003 "tunnelipsec" #1: ignoring Vendor ID payload[FRAGMENTATION c000000]
106 "tunnelipsec" #1: STATE_MAIN_I2: sent MI2, expecting MR2
010 "tunnelipsec" #1: STATE_MAIN_I2: retransmission; will wait 20s for
response
003 "tunnelipsec" #1: ignoring informational payload, type INVALID_COOKIE
msgid=00000000
106 "tunnelipsec" #1: received and ignored informational message

My ipsec.conf looks like:

config setup
    plutodebug="all"
    nat_traversal=yes
    virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12
    oe=off
    interfaces=%defaultroute
    klipsdebug=none

conn tunnelipsec
     type=                      tunnel
     authby=                  secret
     left=                        192.168.92.128
     leftnexthop=            200.200.200.2
     leftsubnet=              192.168.92.0/24
     right=                      200.200.200.1
     rightnexthop=          200.200.200.1
     rightsubnet=           192.168.1.0/24
     esp=                      3des-md5-96
     keyexchange=        ike
     pfs=                       no
     auto=                     route


The asa config: if you need more info than this let me know, just put what i
thought to be important.

access-list inside_nat0_outbound extended permit ip 192.168.1.0
255.255.255.0 192.168.92.0 255.255.255.0
access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0
192.168.92.0 255.255.0.0
access-list outside_1_cryptomap extended permit ip host 200.200.200.2
192.168.1.0 255.255.255.0
access-list outside_access_in extended permit ip 192.168.92.0 255.255.255.0
192.168.1.0 255.255.255.0
access-list outside_access_in extended permit ip host 200.200.200.2
192.168.1.0 255.255.255.0


nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0

access-group outside_1_cryptomap in interface outside

route outside 192.168.92.0 255.255.255.0 200.200.200.2 1

no sysopt connection permit-ipsec

crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set peer 192.168.92.128
crypto map outside_map 1 set transform-set ESP-3DES-MD5
crypto map outside_map interface outside

crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 10
   authentication pre-share
   encryption 3des
   hash md5
   group 2
   lifetime 86400

tunnel-group 200.200.200.1 type ipsec-l2l
tunnel-group 200.200.200.1 ipsec-attributes
pre-shared-key *

Thanks,

Ryan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100707/15b1fae7/attachment.html 


More information about the Users mailing list