Proposal mismatch, Symptom, Analysis – H3C Technologies H3C SecPath F1000-E User Manual
Page 181: Solution, Failing to establish an ipsec tunnel, Acl configuration error

17
Proposal Mismatch
Symptom
The proposals mismatch.
Analysis
Following is the debugging information:
got NOTIFY of type NO_PROPOSAL_CHOSEN
Or
drop message from A.B.C.D due to notification type NO_PROPOSAL_CHOSEN
The two parties in the negotiation have no matched proposals.
Solution
For the negotiation in phase 1, you can look up the IKE proposals for a match. For the negotiation in
phase 2, you can check whether the parameters of the IPsec policies applied on the interfaces are
matched, and whether the referred IPsec proposals have a match in protocol, encryption and
authentication algorithms.
Failing to Establish an IPsec Tunnel
Symptom
The expected IPsec tunnel cannot be established.
Analysis
Sometimes this may happen that an IPsec tunnel cannot be established or there is no way to
communicate in the presence of an IPsec tunnel in an unstable network. According to examination results,
however, ACLs of both parties are configured correctly, and proposals are also matched.
In this case, the problem is usually caused by the reboot of one router after the IPsec tunnel is established.
Solution
•
Use the display ike sa command to check whether both parties have established an SA in phase 1.
•
Use the display ipsec sa policy command to check whether the IPsec policy on the interface has
established IPsec SA.
•
If the above two results display that one party has an SA but the other does not, then use the reset
ike sa command to clear SA with error and restart negotiation.
ACL Configuration Error
Symptom
ACL configuration error results in data flow blockage.
Analysis
When multiple devices create different IPsec tunnels early or late, a device may have multiple peers. If the
device is not configured with ACL rule, the peers send packets to it to set up different IPsec tunnels in
different protection granularity respectively. As the priorities of IPsec tunnels are determined by the order
they are established, a device cannot interoperate with other peers in fine granularity when its outbound
packets are first matched with an IPsec tunnel in coarse granularity.