F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices VPN Configuration Guide-6PW100

137
414BAnalysis
The following is the debugging information:
got NOTIFY of type NO_PROPOSAL_CHOSEN
Or
drop message from A.B.C.D due to notification type NO_PROPOSAL_CHOSEN
The two parties in the negotiation have no matched proposals.
415BSolution
For the negotiation in phase 1, look up the IKE proposals for a match.
For the negotiation in phase 2, verify that the parameters of the IPsec policies applied on the interfaces
are matched, and that the referred IPsec transform sets have a match in protocol, encryption and
authentication algorithms.
188BFailing to establish an IPsec tunnel
416BSymptom
The expected IPsec tunnel cannot be established.
417BAnalysis
Sometimes this may happen if an IPsec tunnel cannot be established or there is no way to communicate
in the presence of an IPsec tunnel in an unstable network.
If ACLs of both parties are configured correctly, and proposals are also matched, the problem is usually
caused by the reboot of one router after the IPsec tunnel is established.
418BSolution
Use the display ike sa command to verify that both parties have established an SA in phase 1.
Use the display ipsec sa policy command to verify that the IPsec policy on the interface has
established IPsec SA.
If the two commands show that one party has an SA but the other does not, use the reset ipsec sa
command to clear the IPsec SA that has no corresponding SA, use the reset ike sa command to
clear the IKE SA that has no corresponding IKE SA, and trigger SA re-negotiation.
189BACL configuration error
419BSymptom
ACL configuration error results in data flow blockage.
420BAnalysis
When multiple devices create different IPsec tunnels early or late, a device may have multiple peers. If the
device is not configured with ACL rule, the peers send packets to it to set up different IPsec tunnels in
different protection granularity respectively. As the priorities of IPsec tunnels are determined by the order
they are established, a device cannot interoperate with other peers in fine granularity when its outbound
packets are first matched with an IPsec tunnel in coarse granularity.