H3C(1.1.1.1)----Internet----third-party device H(1.1.1.2)
1.Failed to establish IPsec SA.
2.After establishing IPsec SA(can use display ike sa && display ipsec sa to check the status),fail to ping the remote address and fail to forward interesting traffic.
1.Failed to establish IPsec SA.
Make sure ike-proposal and ipsec transform-set are set exactly the same with third-party device H.
H3C:
#
ipsec transform-set TEST
esp encryption-algorithm aes-cbc-192
esp authentication-algorithm sha256
#
ike proposal 1
encryption-algorithm aes-cbc-128
dh group14
authentication-algorithm sha256
#
Third-party device H:
#
ipsec proposal trans
encapsulation-mode transport
esp authentication-algorithm sha2-256
esp encryption-algorithm aes-192
#
ike proposal 1
encryption-algorithm aes-128
dh group14
authentication-algorithm sha2-256
authentication-method pre-share
#
2.After establishing IPsec SA(can use display ike sa && display ipsec sa to check the status),fail to ping the remote address and fail to forward interesting traffic.
Checking in official website, we found following explanation:
#
Usage Scenario
When IPSec uses the SHA-2 algorithm, if the devices on two ends of an IPSec tunnel are from different vendors or run different software versions, they may use different encryption and decryption methods. In this situation, traffic between devices is interrupted.
To solve this problem, run the ipsec authentication sha2 compatible enable command to enable SHA-2 to be compatible with RFC standard algorithm versions.
Example:
Enable the SHA-2 algorithm to be compatible with RFC standard algorithm versions.
<H> system-view
[H] ipsec authentication sha2 compatible enable
1.Make sure ike-proposal and ipsec transform-set are set exactly the same for 2 side devices.
2.When IPSec uses the SHA-2 algorithm, if the devices on two ends of an IPSec tunnel are from different vendors or run different software versions, they may use different encryption and decryption methods. In this situation, traffic between devices is interrupted.
To solve this problem, run the ipsec authentication sha2 compatible enable command
#
ipsec authentication sha2 compatible enable
#
But note that this command will make all the third-party device H ipsec tunnels down ,and we need to active the tunnel again.
#