<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Client hangs at securing communication channel in VPN</title>
    <link>https://community.cisco.com/t5/vpn/vpn-client-hangs-at-securing-communication-channel/m-p/131887#M237368</link>
    <description>&lt;P&gt;I created 2 pix-to-pix vpn connnections on my pix506. Since my vpn clients cannot connect. We are using Cisco client ver3.5.2&lt;/P&gt;&lt;P&gt;Client log shows Msg. severity 3 Invalid Protocol id (0)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*PIX CONFIG*&lt;/P&gt;&lt;P&gt;PIX Ver6.2(2)&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 172.20.0.0 255.255.0.0 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.214 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.215 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip 172.20.0.0 255.255.0.0 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.0 192.168.6.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list GVW_VPN permit ip host 172.20.100.214 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list GVW_VPN permit ip host 172.20.100.215 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list GLDR_VPN permit ip 172.20.100.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list CLIENT permit ip any 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list PELHM_VPN permit ip 172.20.100.0 255.255.255.0 192.168.6.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip local pool dealer 172.16.1.1-172.16.1.254&lt;/P&gt;&lt;P&gt;global (outside) 1 x&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NAT0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0 &lt;/P&gt;&lt;P&gt;route outside 0 0 0.0.0.1 1&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt ipsec pl-compatible&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN3000 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set GVW_VPN esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set GLDR_VPN esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set PELHM_VPN esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map CLIENT 50 match address CLIENT&lt;/P&gt;&lt;P&gt;crypto dynamic-map CLIENT 50 set transform-set VPN3000&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 match address GVW_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 set peer x&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 set transform-set GVW_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 match address GLDR_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 set peer x&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 set transform-set GLDR_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 match address PELHM_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 set peer x&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 set transform-set PELHM_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP interface outside&lt;/P&gt;&lt;P&gt;crypto map CLIENT 50 ipsec-isakmp&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key *** address x netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp key *** address x netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp key *** address x netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp key *** address 0.0.0.0 netmask 0.0.0.0 &lt;/P&gt;&lt;P&gt;isakmp client configuration address-pool local dealer outside&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup WCRSA address-pool dealer&lt;/P&gt;&lt;P&gt;vpngroup WCRSA dns-server 172.20.100.4&lt;/P&gt;&lt;P&gt;vpngroup WCRSA wins-server 172.20.100.4&lt;/P&gt;&lt;P&gt;vpngroup WCRSA split-tunnel 110&lt;/P&gt;&lt;P&gt;vpngroup WCRSA idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup WCRSA password ***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*DEBUG*&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing SA payload. message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): Checking ISAKMP transform 8 against priority 20 policy&lt;/P&gt;&lt;P&gt;ISAKMP:  encryption DES-CBC&lt;/P&gt;&lt;P&gt;ISAKMP:  hash MD5&lt;/P&gt;&lt;P&gt;ISAKMP:  default group 2&lt;/P&gt;&lt;P&gt;ISAKMP:  auth pre-share&lt;/P&gt;&lt;P&gt;ISAKMP:  life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:  life duration (VPI) of  0x0 0x20 0xc4 0x9b &lt;/P&gt;&lt;P&gt;ISAKMP (0): atts are acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing KE payload. message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP: Created a peer node for 165.247.183.138&lt;/P&gt;&lt;P&gt;ISAKMP (0): ID payload&lt;/P&gt;&lt;P&gt;  next-payload : 10&lt;/P&gt;&lt;P&gt;  type         : 2&lt;/P&gt;&lt;P&gt;  protocol     : 17&lt;/P&gt;&lt;P&gt;  port         : 500&lt;/P&gt;&lt;P&gt;  length       : 19&lt;/P&gt;&lt;P&gt;ISAKMP (0): Total payload length: 23&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest &lt;/P&gt;&lt;P&gt;OAK_AG exchange&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing HASH payload. message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing NOTIFY payload 24578 protocol 1&lt;/P&gt;&lt;P&gt;        spi 0, message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing notify INITIAL_CONTACTIPSEC(key_engine): got a queue event...&lt;/P&gt;&lt;P&gt;IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP&lt;/P&gt;&lt;P&gt;IPSEC(key_engine_delete_sas): delete all SAs shared with 165.247.183.138&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): SA has been authenticated&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;ISAKMP (0): sending phase 1 RESPONDER_LIFETIME notify&lt;/P&gt;&lt;P&gt;ISAKMP (0): sending NOTIFY message 24576 protocol 1&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest &lt;/P&gt;&lt;P&gt;ISAKMP_TRANSACTION exchange&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): processing transaction payload from 165.247.183.138. message ID = 2166937244&lt;/P&gt;&lt;P&gt;ISAKMP: Config payload CFG_REQUEST&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): checking request:&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_ADDRESS (1)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NETMASK (2)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_DNS (3)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NBNS (4)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ADDRESS_EXPIRY (5)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 5&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    APPLICATION_VERSION (7)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 7&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28672)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28672&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28673)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28673&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_DEF_DOMAIN (28674)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_SPLIT_INCLUDE (28676)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_PFS (28679)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28680)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28680&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28677)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28677&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): responding to peer config from 165.247.183.138. ID = 840554125&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest x.x.x.x&lt;/P&gt;&lt;P&gt;ISAKMP_TRANSACTION exchange&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): processing transaction payload from 165.247.183.138. message ID = 2166937244&lt;/P&gt;&lt;P&gt;ISAKMP: Config payload CFG_REQUEST&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): checking request:&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_ADDRESS (1)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NETMASK (2)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_DNS (3)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NBNS (4)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ADDRESS_EXPIRY (5)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 5&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    APPLICATION_VERSION (7)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 7&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28672)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28672&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28673)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28673&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_DEF_DOMAIN (28674)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_SPLIT_INCLUDE (28676)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_PFS (28679)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28680)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28680&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28677)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28677&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): responding to peer config from 165.247.183.138. ID = 2883274625&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest x.x.x.x&lt;/P&gt;&lt;P&gt;OAK_QM exchange&lt;/P&gt;&lt;P&gt;oakley_process_quick_mode:&lt;/P&gt;&lt;P&gt;OAK_QM_IDLE&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing SA payload. message ID = 2877072397&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 1&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (1)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 2&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (2)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (5)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (6)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_NULL&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in secondssh debug&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 20:42:43 GMT</pubDate>
    <dc:creator>t.whiten</dc:creator>
    <dc:date>2020-02-21T20:42:43Z</dc:date>
    <item>
      <title>VPN Client hangs at securing communication channel</title>
      <link>https://community.cisco.com/t5/vpn/vpn-client-hangs-at-securing-communication-channel/m-p/131887#M237368</link>
      <description>&lt;P&gt;I created 2 pix-to-pix vpn connnections on my pix506. Since my vpn clients cannot connect. We are using Cisco client ver3.5.2&lt;/P&gt;&lt;P&gt;Client log shows Msg. severity 3 Invalid Protocol id (0)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*PIX CONFIG*&lt;/P&gt;&lt;P&gt;PIX Ver6.2(2)&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 172.20.0.0 255.255.0.0 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.214 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.215 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip 172.20.0.0 255.255.0.0 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NAT0 permit ip host 172.20.100.0 192.168.6.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list GVW_VPN permit ip host 172.20.100.214 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list GVW_VPN permit ip host 172.20.100.215 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list GLDR_VPN permit ip 172.20.100.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list CLIENT permit ip any 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list PELHM_VPN permit ip 172.20.100.0 255.255.255.0 192.168.6.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip local pool dealer 172.16.1.1-172.16.1.254&lt;/P&gt;&lt;P&gt;global (outside) 1 x&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NAT0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0 &lt;/P&gt;&lt;P&gt;route outside 0 0 0.0.0.1 1&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt ipsec pl-compatible&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN3000 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set GVW_VPN esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set GLDR_VPN esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set PELHM_VPN esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map CLIENT 50 match address CLIENT&lt;/P&gt;&lt;P&gt;crypto dynamic-map CLIENT 50 set transform-set VPN3000&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 match address GVW_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 set peer x&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 20 set transform-set GVW_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 match address GLDR_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 set peer x&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 22 set transform-set GLDR_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 match address PELHM_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 set peer x&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP 26 set transform-set PELHM_VPN&lt;/P&gt;&lt;P&gt;crypto map PEER_VPN_MAP interface outside&lt;/P&gt;&lt;P&gt;crypto map CLIENT 50 ipsec-isakmp&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key *** address x netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp key *** address x netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp key *** address x netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp key *** address 0.0.0.0 netmask 0.0.0.0 &lt;/P&gt;&lt;P&gt;isakmp client configuration address-pool local dealer outside&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup WCRSA address-pool dealer&lt;/P&gt;&lt;P&gt;vpngroup WCRSA dns-server 172.20.100.4&lt;/P&gt;&lt;P&gt;vpngroup WCRSA wins-server 172.20.100.4&lt;/P&gt;&lt;P&gt;vpngroup WCRSA split-tunnel 110&lt;/P&gt;&lt;P&gt;vpngroup WCRSA idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup WCRSA password ***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*DEBUG*&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing SA payload. message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): Checking ISAKMP transform 8 against priority 20 policy&lt;/P&gt;&lt;P&gt;ISAKMP:  encryption DES-CBC&lt;/P&gt;&lt;P&gt;ISAKMP:  hash MD5&lt;/P&gt;&lt;P&gt;ISAKMP:  default group 2&lt;/P&gt;&lt;P&gt;ISAKMP:  auth pre-share&lt;/P&gt;&lt;P&gt;ISAKMP:  life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:  life duration (VPI) of  0x0 0x20 0xc4 0x9b &lt;/P&gt;&lt;P&gt;ISAKMP (0): atts are acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing KE payload. message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP: Created a peer node for 165.247.183.138&lt;/P&gt;&lt;P&gt;ISAKMP (0): ID payload&lt;/P&gt;&lt;P&gt;  next-payload : 10&lt;/P&gt;&lt;P&gt;  type         : 2&lt;/P&gt;&lt;P&gt;  protocol     : 17&lt;/P&gt;&lt;P&gt;  port         : 500&lt;/P&gt;&lt;P&gt;  length       : 19&lt;/P&gt;&lt;P&gt;ISAKMP (0): Total payload length: 23&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest &lt;/P&gt;&lt;P&gt;OAK_AG exchange&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing HASH payload. message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing NOTIFY payload 24578 protocol 1&lt;/P&gt;&lt;P&gt;        spi 0, message ID = 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing notify INITIAL_CONTACTIPSEC(key_engine): got a queue event...&lt;/P&gt;&lt;P&gt;IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP&lt;/P&gt;&lt;P&gt;IPSEC(key_engine_delete_sas): delete all SAs shared with 165.247.183.138&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): SA has been authenticated&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;ISAKMP (0): sending phase 1 RESPONDER_LIFETIME notify&lt;/P&gt;&lt;P&gt;ISAKMP (0): sending NOTIFY message 24576 protocol 1&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest &lt;/P&gt;&lt;P&gt;ISAKMP_TRANSACTION exchange&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): processing transaction payload from 165.247.183.138. message ID = 2166937244&lt;/P&gt;&lt;P&gt;ISAKMP: Config payload CFG_REQUEST&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): checking request:&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_ADDRESS (1)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NETMASK (2)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_DNS (3)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NBNS (4)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ADDRESS_EXPIRY (5)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 5&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    APPLICATION_VERSION (7)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 7&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28672)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28672&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28673)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28673&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_DEF_DOMAIN (28674)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_SPLIT_INCLUDE (28676)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_PFS (28679)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28680)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28680&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28677)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28677&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): responding to peer config from 165.247.183.138. ID = 840554125&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest x.x.x.x&lt;/P&gt;&lt;P&gt;ISAKMP_TRANSACTION exchange&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): processing transaction payload from 165.247.183.138. message ID = 2166937244&lt;/P&gt;&lt;P&gt;ISAKMP: Config payload CFG_REQUEST&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): checking request:&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_ADDRESS (1)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NETMASK (2)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_DNS (3)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    IP4_NBNS (4)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ADDRESS_EXPIRY (5)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 5&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    APPLICATION_VERSION (7)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 7&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28672)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28672&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28673)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28673&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_DEF_DOMAIN (28674)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_SPLIT_INCLUDE (28676)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    ALT_PFS (28679)&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28680)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28680&lt;/P&gt;&lt;P&gt;ISAKMP: attribute    UNKNOWN (28677)&lt;/P&gt;&lt;P&gt;        Unsupported Attr: 28677&lt;/P&gt;&lt;P&gt;ISAKMP (0:0): responding to peer config from 165.247.183.138. ID = 2883274625&lt;/P&gt;&lt;P&gt;return status is IKMP_NO_ERROR&lt;/P&gt;&lt;P&gt;crypto_isakmp_process_block: src 165.247.183.138, dest x.x.x.x&lt;/P&gt;&lt;P&gt;OAK_QM exchange&lt;/P&gt;&lt;P&gt;oakley_process_quick_mode:&lt;/P&gt;&lt;P&gt;OAK_QM_IDLE&lt;/P&gt;&lt;P&gt;ISAKMP (0): processing SA payload. message ID = 2877072397&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 1&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (1)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 2&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (2)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_3DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (5)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP (0): skipping next ANDed proposal (6)&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_DES&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-SHA&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in seconds&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life duration (VPI) of  0x0 0x20 0xc4 0x9b IPSEC(validate_proposal): peer address 165.247.183.138 not found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP (0): atts not acceptable. Next payload is 0&lt;/P&gt;&lt;P&gt;ISAKMP : Checking IPSec proposal 9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISAKMP: transform 1, ESP_NULL&lt;/P&gt;&lt;P&gt;ISAKMP:   attributes in transform:&lt;/P&gt;&lt;P&gt;ISAKMP:   authenticator is HMAC-MD5&lt;/P&gt;&lt;P&gt;ISAKMP:   encaps is 1&lt;/P&gt;&lt;P&gt;ISAKMP:   SA life type in secondssh debug&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 20:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-client-hangs-at-securing-communication-channel/m-p/131887#M237368</guid>
      <dc:creator>t.whiten</dc:creator>
      <dc:date>2020-02-21T20:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client hangs at securing communication channel</title>
      <link>https://community.cisco.com/t5/vpn/vpn-client-hangs-at-securing-communication-channel/m-p/131888#M237371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add the following:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; crypto map PEER_VPN_MAP 100 ipsec-isakmp dynamic CLIENT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should get you going.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Aug 2003 23:13:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/vpn-client-hangs-at-securing-communication-channel/m-p/131888#M237371</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2003-08-07T23:13:45Z</dc:date>
    </item>
  </channel>
</rss>

