Кто-нибудь может мне помочь понять, что здесь происходит? Если нет совпадающих предложений с обеих сторон, то хаб немедленно запрашивает удаление, и я не могу понять, почему. Отладка и соответствующие настройки приведены ниже. *Aug 1 21:32:09.155: IKEv2:(SESSION ID = 190,SA ID = 1):Queuing IKE SA delete request reason: Received no proposal chosen notify
*Aug 1 21:32:09.155: IKEv2:(SESSION ID = 190,SA ID = 1):Sending DELETE INFO message for IPsec SA [SPI: 0xF63B988E]
*Aug 1 21:32:09.155: IKEv2:(SESSION ID = 190,SA ID = 1):Building packet for encryption. Aug 1 13:15:29.740 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):IPSec policy validate request sent for profile v2-profile with psh index 1. Aug 1 13:15:29.740 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):
Aug 1 13:15:29.741 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):(SA ID = 1):[IPsec -> IKEv2] Callback received for the validate proposal - FAILED. Aug 1 13:15:29.741 pst: IKEv2-ERROR:(SESSION ID = 300632,SA ID = 1):Received Policies: : Failed to find a matching policyESP: Proposal 1: AES-CBC-128 SHA96 Don't use ESN Aug 1 13:15:29.741 pst: IKEv2-ERROR:(SESSION ID = 300632,SA ID = 1):: Failed to find a matching policy
Aug 1 13:15:29.741 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Sending no proposal chosen notify
Aug 1 13:15:29.741 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Get my authentication method
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):My authentication method is 'PSK'
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Get peer's preshared key for 151.196.127.11
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Generate my authentication data
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Use preshared key for id 100.100.100.3, key len 6
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):[IKEv2 -> Crypto Engine] Generate IKEv2 authentication data
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):[Crypto Engine -> IKEv2] IKEv2 authentication data generation PASSED
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Get my authentication method
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):My authentication method is 'PSK'
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Generating IKE_AUTH message
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Constructing IDr payload: '100.100.100.3' of type 'IPv4 address'
Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Building packet for encryption.
Payload contents: VID IDr AUTH NOTIFY(NO_PROPOSAL_CHOSEN) Aug 1 13:15:29.742 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Sending Packet [To 151.196.127.11:4500/From 100.100.100.3:4500/VRF i0:f0]
Initiator SPI : 2532361CD40BCDBD - Responder SPI : 9F747B68B9CD2B7A Message id: 1
IKEv2 IKE_AUTH Exchange RESPONSE
Payload contents: ENCR Aug 1 13:15:29.743 pst: IKEv2:(SA ID = 1):[IKEv2 -> PKI] Close PKI Session
Aug 1 13:15:29.743 pst: IKEv2:(SA ID = 1):[PKI -> IKEv2] Closing of PKI Session PASSED
Aug 1 13:15:29.743 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):IKEV2 SA created; inserting SA into database. SA lifetime timer (86400 sec) started
Aug 1 13:15:29.743 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Session with IKE ID PAIR (151.196.127.11, 100.100.100.3) is UP
Aug 1 13:15:29.743 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Initializing DPD, configured for 20 seconds
Aug 1 13:15:29.743 pst: IKEv2:(SESSION ID = 0,SA ID = 0):IKEv2 MIB tunnel started, tunnel index 1
Aug 1 13:15:29.743 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Checking for duplicate IKEv2 SA
Aug 1 13:15:29.743 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):No duplicate IKEv2 SA found
Aug 1 13:15:29.743 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Starting timer (8 sec) to delete negotiation context Aug 1 13:15:29.824 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Received Packet [From 151.196.127.11:4500/To 100.100.100.3:4500/VRF i0:f0]
Initiator SPI : 2532361CD40BCDBD - Responder SPI : 9F747B68B9CD2B7A Message id: 2
IKEv2 INFORMATIONAL Exchange REQUEST
Payload contents: DELETE Aug 1 13:15:29.825 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Building packet for encryption. Aug 1 13:15:29.825 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Sending Packet [To 151.196.127.11:4500/From 100.100.100.3:4500/VRF i0:f0]
Initiator SPI : 2532361CD40BCDBD - Responder SPI : 9F747B68B9CD2B7A Message id: 2
IKEv2 INFORMATIONAL Exchange RESPONSE
Payload contents: ENCR Aug 1 13:15:29.826 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Process delete request from peer
Aug 1 13:15:29.826 pst: IKEv2:(SESSION ID = 300632,SA ID = 1):Processing DELETE INFO message for IPsec SA [SPI: 0xF50ABCD1] Конфигурация HUB: crypto ikev2 proposal v2-prop encryption aes-cbc-256 integrity sha256 group 15
!
crypto ikev2 policy v2-policy proposal v2-prop
!
crypto ikev2 keyring v2-keyring peer tmz address <not relevant> pre-shared-key ######### ! peer tmz-2 address 151.196.127.11 pre-shared-key ####### !
!
!
crypto ikev2 profile v2-profile match address local interface GigabitEthernet0/0/0 match identity remote address 0.0.0.0 authentication remote pre-share authentication local pre-share keyring local v2-keyring dpd 20 2 periodic
!
crypto ikev2 nat keepalive 20
!
!
crypto isakmp policy 1 encryption aes hash sha authentication pre-share group 2
!
crypto isakmp policy 2 encryption aes 256 hash sha256 authentication pre-share group 14 !
crypto ipsec transform-set 2025-v2 esp-aes 256 esp-sha256-hmac mode tunnel
crypto ipsec fragmentation after-encryption
!
!
crypto ipsec profile 2025-v2 set transform-set 2025-v2 set ikev2-profile v2-profile
! interface Tunnel1 ip address 172.21.8.9 255.255.255.252 ip mtu 1400 ip tcp adjust-mss 1360 tunnel source GigabitEthernet0/0/0 tunnel mode ipsec ipv4 tunnel destination 151.196.127.11 tunnel protection ipsec profile 2025-v2 Конфигурация SPOKE: crypto ikev2 proposal v2-prop encryption aes-cbc-256 integrity sha256 group 15
!
crypto ikev2 policy v2-policy proposal v2-prop
!
crypto ikev2 keyring v2-keyring peer hub address 100.100.100.3 pre-shared-key ##### !
!
!
crypto ikev2 profile v2-profile match address local interface GigabitEthernet0/0/0 match identity remote address 100.100.100.3 255.255.255.0 identity local address 151.196.127.11 authentication remote pre-share authentication local pre-share keyring local v2-keyring dpd 20 2 periodic
!
crypto ikev2 nat keepalive 20
!
!
crypto isakmp policy 1 encryption aes hash sha authentication pre-share group 2 crypto ipsec transform-set 2025-v2 esp-aes 256 esp-sha256-hmac mode tunnel
crypto ipsec fragmentation after-encryption
!
!
crypto ipsec profile ikev2-v2 set transform-set 2025-v2 set ikev2-profile v2-profile ! interface Tunnel4 ip address 172.21.8.10 255.255.255.252 ip mtu 1400 ip nat inside ip tcp adjust-mss 1360 tunnel source GigabitEthernet0/0/0 tunnel mode ipsec ipv4 tunnel destination 100.100.100.3 tunnel protection ipsec profile ikev2-v2