<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN duplicate ISAKMP message received ICX-7450 in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27039#M1330</link>
    <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169f849d3ca752488e80f" style="color: '#0063ce'; text-decoration: 'none';" data-id="5f9169f849d3ca752488e80f" data-username="hashim_bharoocha"&gt;@hashim_bharoocha&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for that information. I will implement this change and see if there is a change with the duplicate ISAKMP. I read it that as if as long as the ENTIRE combination wasn't the same then it was ok; meaning you could have the same sources, different destinations, default vrfs.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Apr 2021 19:03:40 GMT</pubDate>
    <dc:creator>james_schena</dc:creator>
    <dc:date>2021-04-26T19:03:40Z</dc:date>
    <item>
      <title>VPN duplicate ISAKMP message received ICX-7450</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27036#M1327</link>
      <description>&lt;P style="margin: 0;"&gt;Hub and Spoke topology with multiple IPSEC tunnels going from the Hub to remote spokes for centralized licensing of software. 3 active tunnels, all with identical configurations, minus unique source/destination/authentication combos. 4th area, has the same configurations as the 3 active, again with just the unique combinations.&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0;"&gt;&lt;/P&gt;&lt;P style="margin: 0;"&gt;When &lt;SPAN style="text-decoration: underline;"&gt;debugging ike all&lt;/SPAN&gt; at the Hub, I keep receiving 'Duplicate ISAKMP message received' errors, killing the SA and starting the negotiation over again. The Hub shows 2 Ike SA's constructing during this process, then they die and start over.&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0;"&gt;&lt;/P&gt;&lt;P style="margin: 0;"&gt;The spoke shows no error when &lt;SPAN style="text-decoration: underline;"&gt;debugging ike all&lt;/SPAN&gt; but fails to negotiate and SA.&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0;"&gt;&lt;/P&gt;&lt;P style="margin: 0;"&gt;Here is the meat and potatoes of the Ike/IPSEC configuration @ the HUB:&lt;/P&gt;&lt;P style="margin: 0;"&gt;ikev2 retry-count 15&lt;BR /&gt;ikev2 exchange-max-time 45&lt;BR /&gt;ikev2 retransmit-interval 15&lt;BR /&gt;ikev2 limit max-in-negotiation-sa 256&lt;BR /&gt;ikev2 limit max-sa 200&lt;BR /&gt;ikev2 nat disable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal A&lt;BR /&gt;&amp;nbsp;pre-shared-key A&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal B&lt;BR /&gt;&amp;nbsp;pre-shared-key 2 B&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal C&lt;BR /&gt;&amp;nbsp;pre-shared-key 2 C&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal D&lt;BR /&gt;&amp;nbsp;pre-shared-key 2 D&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal E&lt;BR /&gt;&amp;nbsp;pre-shared-key 2 E&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal F&lt;/P&gt;&lt;P style="margin: 0;"&gt;&amp;nbsp;pre-shared-key 2 F&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal G&lt;/P&gt;&lt;P style="margin: 0;"&gt;&amp;nbsp;pre-shared-key 2 G&lt;BR /&gt;!&lt;BR /&gt;ikev2 auth-proposal H&lt;BR /&gt;&amp;nbsp;pre-shared-key 2 H&lt;/P&gt;&lt;P style="margin: 0;"&gt;!&lt;/P&gt;&lt;P style="margin: 0;"&gt;ikev2 profile A&lt;BR /&gt;&amp;nbsp;authentication A&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.2&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.1&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.2&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.1&lt;BR /&gt;!&lt;BR /&gt;ikev2 profile B&lt;BR /&gt;&amp;nbsp;authentication B&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.17&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.18&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.17&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.18&lt;BR /&gt;!&lt;BR /&gt;ikev2 profile C&lt;BR /&gt;&amp;nbsp;authentication C&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.5&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.6&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.5&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.6&lt;BR /&gt;!&lt;BR /&gt;ikev2 profile D&lt;BR /&gt;&amp;nbsp;authentication D&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.29&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.30&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.29&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.30&lt;BR /&gt;!&lt;BR /&gt;ikev2 profile E&lt;BR /&gt;&amp;nbsp;authentication E&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.33&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.34&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.33&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.34&lt;BR /&gt;!&lt;BR /&gt;ikev2 profile F&lt;BR /&gt;&amp;nbsp;authentication F&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.37&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.38&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.37&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.38&lt;BR /&gt;!&lt;BR /&gt;ikev2 profile G&lt;BR /&gt;&amp;nbsp;authentication G&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.41&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.42&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.41&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.42&lt;BR /&gt;!&lt;BR /&gt;ikev2 profile H&lt;BR /&gt;&amp;nbsp;authentication H&lt;BR /&gt;&amp;nbsp;lifetime 240&lt;BR /&gt;&amp;nbsp;local-identifier address xx.xx.109.45&lt;BR /&gt;&amp;nbsp;remote-identifier address xx.xx.109.46&lt;BR /&gt;&amp;nbsp;match-identity local address xx.xx.109.45&lt;BR /&gt;&amp;nbsp;match-identity remote address xx.xx.109.46&lt;/P&gt;&lt;P style="margin: 0;"&gt;!&lt;/P&gt;&lt;P style="margin: 0;"&gt;ipsec profile A&lt;BR /&gt;&amp;nbsp;ike-profile A&lt;BR /&gt;!&lt;BR /&gt;ipsec profile B&lt;BR /&gt;&amp;nbsp;ike-profile B&lt;BR /&gt;!&lt;BR /&gt;ipsec profile C&lt;BR /&gt;&amp;nbsp;ike-profile C&lt;BR /&gt;!&lt;BR /&gt;ipsec profile D&lt;BR /&gt;&amp;nbsp;ike-profile D&lt;BR /&gt;!&lt;BR /&gt;ipsec profile E&lt;BR /&gt;&amp;nbsp;ike-profile E&lt;BR /&gt;!&lt;BR /&gt;ipsec profile F&lt;BR /&gt;&amp;nbsp;ike-profile F&lt;BR /&gt;!&lt;BR /&gt;ipsec profile G&lt;BR /&gt;&amp;nbsp;ike-profile G&lt;BR /&gt;!&lt;BR /&gt;ipsec profile H&lt;BR /&gt;&amp;nbsp;ike-profile H&lt;/P&gt;&lt;P style="margin: 0;"&gt;!&lt;/P&gt;&lt;P style="margin: 0;"&gt;interface tunnel A&lt;BR /&gt;&amp;nbsp;port-name A&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile A&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.2&lt;BR /&gt;&amp;nbsp;disable&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.2 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip mtu 1425&lt;/P&gt;&lt;P style="margin: 0;"&gt;!&lt;/P&gt;&lt;P style="margin: 0;"&gt;interface tunnel 1&lt;BR /&gt;&amp;nbsp;port-name B&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile B&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.18&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.17 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip mtu 1425&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface tunnel 2&lt;BR /&gt;&amp;nbsp;port-name C&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile C&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.6&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.5 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip mtu 1425&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface tunnel 3&lt;BR /&gt;&amp;nbsp;port-name D&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile D&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.30&lt;BR /&gt;&amp;nbsp;disable&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.29 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip mtu 1425&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface tunnel 4&lt;BR /&gt;&amp;nbsp;port-name E&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile E&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.34&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.33 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip mtu 1425&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface tunnel 6&lt;BR /&gt;&amp;nbsp;port-name F&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile F&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.38&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.37 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface tunnel 7&lt;BR /&gt;&amp;nbsp;port-name G&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile G&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.42&lt;BR /&gt;&amp;nbsp;disable&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.41 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip mtu 1425&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface tunnel 8&lt;BR /&gt;&amp;nbsp;port-name H&lt;BR /&gt;&amp;nbsp;tunnel mode ipsec ipv4&lt;BR /&gt;&amp;nbsp;tunnel protection ipsec profile H&lt;BR /&gt;&amp;nbsp;tunnel source xx.xx.3.1&lt;BR /&gt;&amp;nbsp;tunnel destination xx.xx.109.46&lt;BR /&gt;&amp;nbsp;disable&lt;BR /&gt;&amp;nbsp;bandwidth 1000000&lt;BR /&gt;&amp;nbsp;ip address xx.xx.109.45 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip mtu 1425&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 17:37:12 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27036#M1327</guid>
      <dc:creator>james_schena</dc:creator>
      <dc:date>2021-04-22T17:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN duplicate ISAKMP message received ICX-7450</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27037#M1328</link>
      <description>&lt;P style="margin: 0;"&gt;Hi James,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Hope you are doing great.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;I went thru your configuration, i saw some missing info.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;As per our Security guide you are missing VRF for each tunnel.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://support.ruckuswireless.com/documents/2671-fastiron-08-0-90-ga-security-configuration-guide" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/documents/2671-fastiron-08-0-90-ga-security-configuration-guide&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;STRONG&gt;Limitations&lt;/STRONG&gt;&lt;BR /&gt;There are some limitations that impact the use of IPsec for creating secure tunnels.&lt;BR /&gt;The following limitations apply:&lt;BR /&gt;• Only one active ICX7400-SERVICE-MOD module is supported in a Ruckus ICX 7450 stack.&lt;BR /&gt;• Fragmentation is not supported when traffic is routed over an IPSec tunnel; a fragmented IPsec packet received on an&lt;BR /&gt;IPv4 IPsec tunnel is dropped because IPsec packets are not re-assembled before decryption.&lt;BR /&gt;• GRE and IPsec encapsulation are not performed together for the same flow in the same device.&lt;BR /&gt;• When multiple IPSec tunnels are configured on the same device, each IPsec tunnel must have a unique tunnel source, destination,&lt;STRONG&gt; and VRF combination.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;For each tunnel you need to configure a vrf, for example tunnel 1 context:&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;EM&gt;vrf forwarding One&lt;/EM&gt; (or whatever name you want to give the VRF)&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Then steer traffic to the ip address via the tunnel:&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;EM&gt;ip route vrf One a.b.c.d/24 tunnel 1&lt;/EM&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Hope this helps.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Thanks&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Hashim&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 18:38:30 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27037#M1328</guid>
      <dc:creator>hashim_bharooc1</dc:creator>
      <dc:date>2021-04-22T18:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN duplicate ISAKMP message received ICX-7450</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27038#M1329</link>
      <description>&lt;P style="margin: 0;"&gt;Hi James,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;If the issue persist, Pls open a support case so one of our engineers can look into this.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Thanks&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Jijo&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Apr 2021 07:22:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27038#M1329</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2021-04-25T07:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN duplicate ISAKMP message received ICX-7450</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27039#M1330</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169f849d3ca752488e80f" style="color: '#0063ce'; text-decoration: 'none';" data-id="5f9169f849d3ca752488e80f" data-username="hashim_bharoocha"&gt;@hashim_bharoocha&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for that information. I will implement this change and see if there is a change with the duplicate ISAKMP. I read it that as if as long as the ENTIRE combination wasn't the same then it was ok; meaning you could have the same sources, different destinations, default vrfs.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Apr 2021 19:03:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/VPN-duplicate-ISAKMP-message-received-ICX-7450/m-p/27039#M1330</guid>
      <dc:creator>james_schena</dc:creator>
      <dc:date>2021-04-26T19:03:40Z</dc:date>
    </item>
  </channel>
</rss>

