<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>安全讨论区中的主题 IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
    <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348319#M5657</link>
    <description>帖子上有好多表情啊。各位大神过来瞧瞧啊~！管理员我怎么不能编辑添加悬赏？能否帮忙设置回复给积分啊？？呵呵。</description>
    <pubDate>Wed, 12 Dec 2018 08:34:45 GMT</pubDate>
    <dc:creator>wuhao0015</dc:creator>
    <dc:date>2018-12-12T08:34:45Z</dc:date>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348318#M5656</link>
      <description>各位大神，最新使用IOS配置IKEv2的anyconnect使用IKE-RSA无法连接。&lt;BR /&gt;介绍。单个CSR的IOS，无三方AAA服务器，无三方CA，无域环境。&lt;BR /&gt;&lt;FONT size="5"&gt;配置如下：&lt;/FONT&gt;&lt;BR /&gt;==========================================&lt;BR /&gt;csr1kv#show version &lt;BR /&gt;Cisco IOS XE Software, Version 03.16.06.S - Extended Support Release&lt;BR /&gt;Cisco IOS Software, CSR1000V Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5(3)S6, RELEASE SOFTWARE (fc3)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2017 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Mon 24-Jul-17 20:01 by mcpre&lt;BR /&gt;Cisco IOS-XE software, Copyright (c) 2005-2017 by cisco Systems, Inc.&lt;BR /&gt;All rights reserved.  Certain components of Cisco IOS-XE software are&lt;BR /&gt;licensed under the GNU General Public License ("GPL") Version 2.0.  The&lt;BR /&gt;software code licensed under GPL Version 2.0 is free software that comes&lt;BR /&gt;with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such&lt;BR /&gt;GPL code under the terms of GPL Version 2.0.  For more details, see the&lt;BR /&gt;documentation or "License Notice" file accompanying the IOS-XE software,&lt;BR /&gt;or the applicable URL provided on the flyer accompanying the IOS-XE&lt;BR /&gt;software.&lt;BR /&gt;ROM: IOS-XE ROMMON&lt;BR /&gt;csr1kv uptime is 1 day, 4 hours, 26 minutes&lt;BR /&gt;Uptime for this control processor is 1 day, 4 hours, 28 minutes&lt;BR /&gt;System returned to ROM by reload at 11:27:53 Beijing Tue Dec 11 2018&lt;BR /&gt;System restarted at 11:30:10 Beijing Tue Dec 11 2018&lt;BR /&gt;System image file is "bootflash:packages.conf"&lt;BR /&gt;Last reload reason: Reload Command&lt;BR /&gt;This product contains cryptographic features and is subject to United&lt;BR /&gt;States and local country laws governing import, export, transfer and&lt;BR /&gt;use. Delivery of Cisco cryptographic products does not imply&lt;BR /&gt;third-party authority to import, export, distribute or use encryption.&lt;BR /&gt;Importers, exporters, distributors and users are responsible for&lt;BR /&gt;compliance with U.S. and local country laws. By using this product you&lt;BR /&gt;agree to comply with applicable laws and regulations. If you are unable&lt;BR /&gt;to comply with U.S. and local laws, return this product immediately.&lt;BR /&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;BR /&gt;If you require further assistance please contact us by sending email to&lt;BR /&gt;&lt;A href="mailto:export@cisco.com" target="_blank"&gt;export@cisco.com&lt;/A&gt;.&lt;BR /&gt;License Level: ax&lt;BR /&gt;License Type: Default. No valid license found.&lt;BR /&gt;Next reload license Level: ax&lt;BR /&gt;cisco CSR1000V (VXE) processor (revision VXE) with 1090317K/6147K bytes of memory.&lt;BR /&gt;Processor board ID 9ZMT9E7R1HJ&lt;BR /&gt;4 Gigabit Ethernet interfaces&lt;BR /&gt;32768K bytes of non-volatile configuration memory.&lt;BR /&gt;3022272K bytes of physical memory.&lt;BR /&gt;7774207K bytes of virtual hard disk at bootflash:.&lt;BR /&gt;Configuration register is 0x2102&lt;BR /&gt;csr1kv#        &lt;BR /&gt;csr1kv#show running-config &lt;BR /&gt;Building configuration...&lt;BR /&gt;Current configuration : 16673 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 13:41:06 Beijing Wed Dec 12 2018&lt;BR /&gt;! NVRAM config last updated at 13:26:02 Beijing Wed Dec 12 2018&lt;BR /&gt;!&lt;BR /&gt;version 15.5&lt;BR /&gt;service timestamps debug datetime msec localtime&lt;BR /&gt;service timestamps log datetime msec localtime&lt;BR /&gt;service password-encryption&lt;BR /&gt;no platform punt-keepalive disable-kernel-core&lt;BR /&gt;platform console serial&lt;BR /&gt;!&lt;BR /&gt;hostname csr1kv&lt;BR /&gt;!&lt;BR /&gt;logging buffered 102400&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!        &lt;BR /&gt;aaa authentication suppress null-username&lt;BR /&gt;aaa authentication login anyconnect local&lt;BR /&gt;aaa authorization network anyconnect local &lt;BR /&gt;!&lt;BR /&gt;clock timezone Beijing 8 0&lt;BR /&gt;!&lt;BR /&gt;ip name-server 114.114.114.114&lt;BR /&gt;!&lt;BR /&gt;crypto pki server ca.iteachs.com&lt;BR /&gt; database level names&lt;BR /&gt; no database archive&lt;BR /&gt; hash sha512&lt;BR /&gt; lifetime certificate 3650&lt;BR /&gt; lifetime ca-certificate 3650&lt;BR /&gt; auto-rollover 365&lt;BR /&gt; eku server-auth client-auth &lt;BR /&gt; database url flash:/ca&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint csr1kv.local&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=csr1kv.local&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair csr1kv.local&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint ca.iteachs.com&lt;BR /&gt; revocation-check crl&lt;BR /&gt; rsakeypair ca.iteachs.com&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint csr1kv.iteachs.com&lt;BR /&gt; enrollment url &lt;A href="http://10.1.1.1:80" target="_blank"&gt;http://10.1.1.1:80&lt;/A&gt;&lt;BR /&gt; fqdn csr1kv.iteachs.com&lt;BR /&gt; ip-address 202.100.1.100&lt;BR /&gt; subject-name cn=csr1kv.iteachs.com&lt;BR /&gt; revocation-check crl&lt;BR /&gt; rsakeypair csr1kv.iteachs.com&lt;BR /&gt; auto-enroll regenerate&lt;BR /&gt; hash sha512&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate map anyconnect-cert 10&lt;BR /&gt; issuer-name co cn = ca.iteachs.com&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain csr1kv.local&lt;BR /&gt; certificate self-signed 01&lt;BR /&gt;  3082032A 30820212 A0030201 02020101 300D0609 2A864886 F70D0101 05050030 &lt;BR /&gt;  2E311530 13060355 0403130C 63737231 6B762E6C 6F63616C 31153013 06092A86 &lt;BR /&gt;        quit&lt;BR /&gt;crypto pki certificate chain ca.iteachs.com&lt;BR /&gt; certificate ca 01&lt;BR /&gt;  27CDC049 27CC238B AFE5A8A4 52D39225 718BEB2B 99182112 E4487755 2E81A4E2 &lt;BR /&gt;  973FD4F6 CC01EFBF 50E6B6CB A25AB583 95D7AEB9&lt;BR /&gt;        quit&lt;BR /&gt;crypto pki certificate chain csr1kv.iteachs.com&lt;BR /&gt; certificate 02&lt;BR /&gt;  316C9C5D 721E666F EB3BEC27 4F6C11C3 7FF8EC60 5A1F1765 1E56BF23 4A593D2D &lt;BR /&gt;  23E1A15B 48C6B405 CA4EE84C F99D0C63 B5B9732E A73C2BD7 B6C746EC E5E54D58 1D1F&lt;BR /&gt;        quit&lt;BR /&gt; certificate ca 01&lt;BR /&gt;  27CDC049 27CC238B AFE5A8A4 52D39225 718BEB2B 99182112 E4487755 2E81A4E2 &lt;BR /&gt;  973FD4F6 CC01EFBF 50E6B6CB A25AB583 95D7AEB9&lt;BR /&gt;        quit&lt;BR /&gt;!&lt;BR /&gt;username admin privilege 15 secret 5 $1$bVLV$u0lFX9bJ3IFSF7M6R7UFe.&lt;BR /&gt;username cisco password 7 02050D480809&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 authorization policy anyconnect-auth-policy &lt;BR /&gt; pool anyconnect&lt;BR /&gt; dns 10.1.1.1&lt;BR /&gt; def-domain iteachs.com&lt;BR /&gt; route set access-list anyconnect-tunnel&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 proposal anyconnect-prop &lt;BR /&gt; encryption aes-cbc-256&lt;BR /&gt; integrity sha256&lt;BR /&gt; group 2&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 policy anyconnect-policy &lt;BR /&gt; proposal anyconnect-prop&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 profile anyconnect-cert-profile&lt;BR /&gt; match certificate anyconnect-cert&lt;BR /&gt; authentication local rsa-sig&lt;BR /&gt; authentication remote rsa-sig&lt;BR /&gt; pki trustpoint csr1kv.iteachs.com&lt;BR /&gt; aaa authorization group cert list anyconnect anyconnect-auth-policy&lt;BR /&gt; virtual-template 2&lt;BR /&gt;!&lt;BR /&gt;no crypto ikev2 http-url cert&lt;BR /&gt;!         &lt;BR /&gt;crypto ipsec transform-set anyconnect esp-aes 256 esp-sha256-hmac &lt;BR /&gt; mode transport&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile anyconncet-cert-profile&lt;BR /&gt; set transform-set anyconnect &lt;BR /&gt; set ikev2-profile anyconnect-cert-profile&lt;BR /&gt;!         &lt;BR /&gt;!&lt;BR /&gt;interface Loopback0&lt;BR /&gt; ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt; ip address 202.100.1.100 255.255.255.0&lt;BR /&gt; negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-Template2 type tunnel&lt;BR /&gt; ip unnumbered Loopback0&lt;BR /&gt; tunnel mode ipsec ipv4&lt;BR /&gt; tunnel protection ipsec profile anyconncet-cert-profile&lt;BR /&gt;!&lt;BR /&gt;ip local pool anyconnect 20.1.1.1 20.1.1.20&lt;BR /&gt;ip http server&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 202.100.1.1&lt;BR /&gt;!&lt;BR /&gt;ip access-list standard anyconnect-tunnel&lt;BR /&gt; permit 10.1.1.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; stopbits 1&lt;BR /&gt;line vty 1&lt;BR /&gt; length 0&lt;BR /&gt;line vty 2 4&lt;BR /&gt;!&lt;BR /&gt;ntp server ntp3.aliyun.com&lt;BR /&gt;ntp server ntp2.aliyun.com&lt;BR /&gt;ntp server ntp1.aliyun.com&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;==========================================&lt;BR /&gt;&lt;FONT size="5"&gt;查看密钥及证书：&lt;/FONT&gt;&lt;BR /&gt;csr1kv#show crypto key mypubkey rsa &lt;BR /&gt;% Key pair was generated at: 16:11:46 Beijing Dec 6 2018&lt;BR /&gt;Key name: csr1kv.local&lt;BR /&gt;Key type: RSA KEYS&lt;BR /&gt; Storage Device: private-config&lt;BR /&gt; Usage: General Purpose Key&lt;BR /&gt; Key is not exportable. Redundancy enabled.&lt;BR /&gt; Key Data:&lt;BR /&gt;  30820122 300D0609 2A864886 F70D0101 01050003 82010F00 3082010A 02820101 &lt;BR /&gt;  00B62358 3CBFC1FB 8D5A623F 206E7DFA 99E5A5E2 BF043098 0F090998 A8BEA5D5 &lt;BR /&gt;  9852DC74 CEBCF66F DED4E0E7 95D6DA10 936D0A37 10BCCD94 C81C91D6 FF5A7349 &lt;BR /&gt;  ED0AB77D 008DC60C A7D8436A 92239786 12CCEDAD 0E3E1DE0 E99B89A7 E7759681 &lt;BR /&gt;  D062D6F9 B58D2564 01989B8D C0B2C4B4 AD18474F 4DA7206B B1A50B63 7F76C17C &lt;BR /&gt;  09DB15E0 25874F06 DE2CFFB9 B70C2C12 16C24387 CB7F4E1C A241D950 EFC078B4 &lt;BR /&gt;  84BAAF56 0172937A 3A2BBF35 7B24488C F13ADAA0 9CFA06D1 EB91C91E DC2A69A5 &lt;BR /&gt;  613944E3 159E011D 10268AB8 0EEF3CBB EBE1010A 22E68655 7E1FFEEF 7FB336DD &lt;BR /&gt;  0DFA27A1 B5A1BEFD 9C03A3FB ADD70E70 A66164A5 9B823EC6 0F87A464 4ED38DE1 &lt;BR /&gt;  C3020301 0001&lt;BR /&gt;% Key pair was generated at: 11:31:03 Beijing Dec 11 2018&lt;BR /&gt;Key name: csr1kv.local.server&lt;BR /&gt;Key type: RSA KEYS&lt;BR /&gt;Temporary key&lt;BR /&gt; Usage: Encryption Key&lt;BR /&gt; Key is not exportable.&lt;BR /&gt; Key Data:&lt;BR /&gt;  307C300D 06092A86 4886F70D 01010105 00036B00 30680261 00998E3F F0C711F7 &lt;BR /&gt;  6D722E38 F02BFD73 6F6E637E EAB973EB F509A56D 14951BB2 EF691023 4C54756F &lt;BR /&gt;  C1E1F533 EA15C015 6FFCFFA8 9A55F9D5 B8556131 5DCD0D47 515BFB78 3234D891 &lt;BR /&gt;  4C836ECA 9F7BB89C 86D1BC15 FFD27095 D4769EBA 1394F25B 3B020301 0001&lt;BR /&gt;% Key pair was generated at: 09:42:08 Beijing Dec 12 2018&lt;BR /&gt;Key name: ca.iteachs.com&lt;BR /&gt;Key type: RSA KEYS&lt;BR /&gt; Storage Device: private-config&lt;BR /&gt; Usage: General Purpose Key&lt;BR /&gt; Key is exportable. Redundancy enabled.&lt;BR /&gt; Key Data:&lt;BR /&gt;  30820222 300D0609 2A864886 F70D0101 01050003 82020F00 3082020A 02820201 &lt;BR /&gt;  C70FD758 5F727765 1C597F2C B76FB4A4 97FBC011 63910C83 5FEB5417 7A37C129 &lt;BR /&gt;  CF020301 0001&lt;BR /&gt;% Key pair was generated at: 09:45:12 Beijing Dec 12 2018&lt;BR /&gt;Key name: csr1kv.iteachs.com&lt;BR /&gt;Key type: RSA KEYS&lt;BR /&gt; Storage Device: private-config&lt;BR /&gt; Usage: General Purpose Key&lt;BR /&gt; Key is exportable. Redundancy enabled.&lt;BR /&gt; Key Data:&lt;BR /&gt;  30820222 300D0609 2A864886 F70D0101 01050003 82020F00 3082020A 02820201 &lt;BR /&gt;  00A8B18E 361300FC C7E62CED 8E0555BE E93842E3 20515A64 B51C7F32 C8E22B40 &lt;BR /&gt;  2CA59EC1 0A80CF09 FFD97E16 4B93934B AAE4A1F1 7560B3C7 15179605 93744D21 &lt;BR /&gt;  C1020301 0001&lt;BR /&gt;csr1kv#      &lt;BR /&gt;csr1kv#show crypto pki server ca.iteachs.com requests &lt;BR /&gt; The Enrollment Request Database is empty.&lt;BR /&gt;csr1kv#                                 &lt;BR /&gt;csr1kv#show crypto pki certificates &lt;BR /&gt;Certificate&lt;BR /&gt;  Status: Available&lt;BR /&gt;  Certificate Serial Number (hex): 02&lt;BR /&gt;  Certificate Usage: General Purpose&lt;BR /&gt;  Issuer: &lt;BR /&gt;    cn=ca.iteachs.com&lt;BR /&gt;  Subject:&lt;BR /&gt;    Name: csr1kv.iteachs.com&lt;BR /&gt;    IP Address: 202.100.1.100&lt;BR /&gt;    ipaddress=202.100.1.100+hostname=csr1kv.iteachs.com&lt;BR /&gt;    cn=csr1kv.iteachs.com&lt;BR /&gt;  Validity Date: &lt;BR /&gt;    start date: 09:48:51 Beijing Dec 12 2018&lt;BR /&gt;    end   date: 09:42:34 Beijing Dec 9 2028&lt;BR /&gt;  Associated Trustpoints: csr1kv.iteachs.com &lt;BR /&gt;  Storage: nvram:caiteachscom#2.cer&lt;BR /&gt;CA Certificate&lt;BR /&gt;  Status: Available&lt;BR /&gt;  Certificate Serial Number (hex): 01&lt;BR /&gt;  Certificate Usage: Signature&lt;BR /&gt;  Issuer: &lt;BR /&gt;    cn=ca.iteachs.com&lt;BR /&gt;  Subject: &lt;BR /&gt;    cn=ca.iteachs.com&lt;BR /&gt;  Validity Date: &lt;BR /&gt;    start date: 09:42:34 Beijing Dec 12 2018&lt;BR /&gt;    end   date: 09:42:34 Beijing Dec 9 2028&lt;BR /&gt;  Associated Trustpoints: csr1kv.iteachs.com ca.iteachs.com &lt;BR /&gt;  Storage: nvram:caiteachscom#1CA.cer&lt;BR /&gt;Router Self-Signed Certificate&lt;BR /&gt;  Status: Available&lt;BR /&gt;  Certificate Serial Number (hex): 01&lt;BR /&gt;  Certificate Usage: General Purpose&lt;BR /&gt;  Issuer: &lt;BR /&gt;    hostname=csr1kv&lt;BR /&gt;    cn=csr1kv.local&lt;BR /&gt;  Subject:&lt;BR /&gt;    Name: csr1kv&lt;BR /&gt;    hostname=csr1kv&lt;BR /&gt;    cn=csr1kv.local&lt;BR /&gt;  Validity Date: &lt;BR /&gt;    start date: 16:12:10 Beijing Dec 6 2018&lt;BR /&gt;    end   date: 08:00:00 Beijing Jan 1 2020&lt;BR /&gt;  Associated Trustpoints: csr1kv.local &lt;BR /&gt;  Storage: nvram:csr1kv#1.cer&lt;BR /&gt;csr1kv#       &lt;BR /&gt;csr1kv#&lt;BR /&gt;csr1kv#show crypto pki server &lt;BR /&gt;Certificate Server ca.iteachs.com:&lt;BR /&gt;    Status: enabled&lt;BR /&gt;    State: enabled&lt;BR /&gt;    Server's configuration is locked  (enter "shut" to unlock it)&lt;BR /&gt;    Issuer name: CN=ca.iteachs.com&lt;BR /&gt;    CA cert fingerprint: F9D47883 1DBA7AD6 7065FB01 91325B1D &lt;BR /&gt;    Granting mode is: manual&lt;BR /&gt;    Last certificate issued serial number (hex): 3&lt;BR /&gt;    CA certificate expiration timer: 09:42:34 Beijing Dec 9 2028&lt;BR /&gt;    CRL NextUpdate timer: 21:42:34 Beijing Dec 12 2018&lt;BR /&gt;    Current primary storage dir: flash:/ca&lt;BR /&gt;    Database Level: Names - subject name data written as &lt;SERIALNUM&gt;.cnm&lt;BR /&gt;    Auto-Rollover configured, overlap period 365 days&lt;BR /&gt;    Autorollover timer: 09:42:34 Beijing Dec 10 2027&lt;BR /&gt;csr1kv#&lt;BR /&gt;csr1kv#&lt;BR /&gt;IOS有个人证书和CA根证书。&lt;BR /&gt;===============================&lt;BR /&gt;&lt;FONT size="5"&gt;下面为客户端生成证书：&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;crypto key generate rsa general modulus 4096 exportable label &lt;A href="mailto:user1@iteachs.com" target="_blank"&gt;user1@iteachs.com&lt;/A&gt; #客户端单独生成密钥&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;crypto pki trustpoint &lt;A href="mailto:user1@iteachs.com" target="_blank"&gt;user1@iteachs.com&lt;/A&gt;  #客户端的信任点&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; enrollment url &lt;A href="http://10.1.1.1" target="_blank"&gt;http://10.1.1.1&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; serial-number none&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; fqdn none&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; ip-address none&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; subject-name CN=user1@iteachs.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; revocation-check none&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; rsakeypair &lt;A href="mailto:user1@iteachs.com" target="_blank"&gt;user1@iteachs.com&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; auto-enroll&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; hash sha512&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;crypto pki authenticate &lt;A href="mailto:user1@iteachs.com" target="_blank"&gt;user1@iteachs.com&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;crypto pki enroll &lt;A href="mailto:user1@iteachs.com" target="_blank"&gt;user1@iteachs.com&lt;/A&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;do crypto pki server ca-server grant 1 #颁发客户端证书&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;crypto pki export &lt;A href="mailto:user1@iteachs.com" target="_blank"&gt;user1@iteachs.com&lt;/A&gt; pem t&lt;A href="ftp://192.168.100.100" target="_blank"&gt;ftp://192.168.100.100&lt;/A&gt;  #导出到客户端上&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;导出后删除用户的个人证书和rsa的key。&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="5"&gt;客户端安装根证书和个人证书。&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="5"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="162249zzu28uhv8ep28wdu.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/114523iBDF5D2FC8975B3C4/image-size/large?v=v2&amp;amp;px=999" role="button" title="162249zzu28uhv8ep28wdu.png" alt="162249zzu28uhv8ep28wdu.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="162249nahla8bng1hgygah.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/114524i401B9DECBBB1424E/image-size/large?v=v2&amp;amp;px=999" role="button" title="162249nahla8bng1hgygah.png" alt="162249nahla8bng1hgygah.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="5"&gt;anyconnect的配置文件&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;ANYCONNECTPROFILE xmlns="http://schemas.xmlsoap.org/encoding/"&gt;&lt;/ANYCONNECTPROFILE&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; xsi:schemaLocation="http://schemas.xmlsoap.org/encoding/AnyConnectProfile.xsd"&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; &lt;SERVERLIST&gt;&lt;/SERVERLIST&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;  &lt;HOSTENTRY&gt;&lt;/HOSTENTRY&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;   &lt;HOSTNAME&gt;Company&lt;/HOSTNAME&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;   &lt;HOSTADDRESS&gt;202.100.1.100&lt;/HOSTADDRESS&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;   &lt;PRIMARYPROTOCOL&gt;IPsec&lt;/PRIMARYPROTOCOL&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;   &lt;STANDARDAUTHENTICATIONONLY&gt;true&lt;/STANDARDAUTHENTICATIONONLY&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;    &lt;AUTHMETHODDURINGIKENEGOTIATION&gt;IKE-RSA&lt;/AUTHMETHODDURINGIKENEGOTIATION&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;   &lt;/FONT&gt;&lt;/SERIALNUM&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;   &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;  &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;拨号直接无法连接&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="5"&gt;下面是IOS的debug信息。&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;csr1kv# &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.913: IKEv2:Received Packet [From 192.168.100.100:49827/To 202.100.1.100:500/VRF i0:f0] &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Initiator SPI : B6A1173CBDE0ADB8 - Responder SPI : 0000000000000000 Message id: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;IKEv2 IKE_SA_INIT Exchange REQUEST &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Payload contents: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; SA KE N VID VID VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) VID CFG NOTIFY(REDIRECT_SUPPORTED) &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.913: IKEv2:(SESSION ID = 92,SA ID = 1):Verify SA init message&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.913: IKEv2:(SESSION ID = 92,SA ID = 1):Insert SA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.913: IKEv2:Searching Policy with fvrf 0, local address 202.100.1.100&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.913: IKEv2:Found Policy 'anyconnect-policy'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.913: IKEv2:(SESSION ID = 92,SA ID = 1):Processing IKE_SA_INIT message&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.923: IKEv2-ERROR:(SESSION ID = 92,SA ID = 1):: The peer's KE payload contained the wrong DH group&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.923: IKEv2:(SESSION ID = 92,SA ID = 1):Sending invalid ke notification, peer sent group 1, local policy prefers group 2 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.923: IKEv2:(SESSION ID = 92,SA ID = 1):Sending Packet [To 192.168.100.100:49827/From 202.100.1.100:500/VRF i0:f0] &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Initiator SPI : B6A1173CBDE0ADB8 - Responder SPI : 0000000000000000 Message id: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;IKEv2 IKE_SA_INIT Exchange RESPONSE &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Payload contents: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; NOTIFY(INVALID_KE_PAYLOAD) &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.923: IKEv2:(SESSION ID = 92,SA ID = 1):Failed SA init exchange&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.923: IKEv2-ERROR:(SESSION ID = 92,SA ID = 1):Initial exchange failed: Initial exchange failed&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.924: IKEv2:(SESSION ID = 92,SA ID = 1):Abort exchange&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.924: IKEv2:(SESSION ID = 92,SA ID = 1):Deleting SA &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.931: IKEv2:Received Packet [From 192.168.100.100:49827/To 202.100.1.100:500/VRF i0:f0] &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Initiator SPI : B6A1173CBDE0ADB8 - Responder SPI : 0000000000000000 Message id: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;IKEv2 IKE_SA_INIT Exchange REQUEST &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Payload contents: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; SA KE N VID VID VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) VID CFG NOTIFY(REDIRECT_SUPPORTED) &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.931: IKEv2:(SESSION ID = 93,SA ID = 1):Verify SA init message&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.931: IKEv2:(SESSION ID = 93,SA ID = 1):Insert SA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.931: IKEv2:Searching Policy with fvrf 0, local address 202.100.1.100&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.931: IKEv2:Found Policy 'anyconnect-policy'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.931: IKEv2:(SESSION ID = 93,SA ID = 1):Processing IKE_SA_INIT message&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SESSION ID = 93,SA ID = 1):Received valid config mode data&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:Config data recieved:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SESSION ID = 93,SA ID = 1):Config-type: Config-request &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SESSION ID = 93,SA ID = 1):Attrib type: unknown, length: 2, data: 0x2 0x40&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:IKEv2 responder - ignoring config data received in IKE_SA_INIT exch&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SESSION ID = 93,SA ID = 1):Set received config mode data&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SA ID = 1):[IKEv2 -&amp;gt; PKI] Retrieve configured trustpoint(s)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SA ID = 1):[PKI -&amp;gt; IKEv2] Retrieved trustpoint(s): 'csr1kv.iteachs.com'   'ca.iteachs.com'   'csr1kv.local'   &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SA ID = 1):[IKEv2 -&amp;gt; PKI] Get Public Key Hashes of trustpoints&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.935: IKEv2:(SA ID = 1):[PKI -&amp;gt; IKEv2] Getting of Public Key Hashes of trustpoints PASSED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.936: IKEv2:(SA ID = 1):[IKEv2 -&amp;gt; PKI] Start PKI Session&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.936: IKEv2:(SA ID = 1):[PKI -&amp;gt; IKEv2] Starting of PKI Session PASSED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.936: IKEv2:(SESSION ID = 93,SA ID = 1):[IKEv2 -&amp;gt; Crypto Engine] Computing DH public key, DH Group 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.937: IKEv2:(SA ID = 1):[Crypto Engine -&amp;gt; IKEv2] DH key Computation PASSED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.937: IKEv2:(SESSION ID = 93,SA ID = 1):Request queued for computation of DH key&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.937: IKEv2:(SESSION ID = 93,SA ID = 1):[IKEv2 -&amp;gt; Crypto Engine] Computing DH secret key, DH Group 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SA ID = 1):[Crypto Engine -&amp;gt; IKEv2] DH key Computation PASSED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SESSION ID = 93,SA ID = 1):Request queued for computation of DH secret&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SA ID = 1):[IKEv2 -&amp;gt; Crypto Engine] Calculate SKEYSEED and create rekeyed IKEv2 SA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SA ID = 1):[Crypto Engine -&amp;gt; IKEv2] SKEYSEED calculation and creation of rekeyed IKEv2 SA PASSED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:IKEv2 responder - no config data to send in IKE_SA_INIT exch&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SESSION ID = 93,SA ID = 1):Generating IKE_SA_INIT message&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SESSION ID = 93,SA ID = 1):IKE Proposal: 2, SPI size: 0 (initial negotiation), &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Num. transforms: 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;   AES-CBC   SHA256   SHA256   DH_GROUP_1024_MODP/Group 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SA ID = 1):[IKEv2 -&amp;gt; PKI] Retrieve configured trustpoint(s)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SA ID = 1):[PKI -&amp;gt; IKEv2] Retrieved trustpoint(s): 'csr1kv.iteachs.com'   'ca.iteachs.com'   'csr1kv.local'   &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SA ID = 1):[IKEv2 -&amp;gt; PKI] Get Public Key Hashes of trustpoints&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.938: IKEv2:(SA ID = 1):[PKI -&amp;gt; IKEv2] Getting of Public Key Hashes of trustpoints PASSED &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.939: IKEv2:(SESSION ID = 93,SA ID = 1):Sending Packet [To 192.168.100.100:49827/From 202.100.1.100:500/VRF i0:f0] &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Initiator SPI : B6A1173CBDE0ADB8 - Responder SPI : 0AB0DC5CC71D9AED Message id: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;IKEv2 IKE_SA_INIT Exchange RESPONSE &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Payload contents: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt; SA KE N VID VID VID VID VID NOTIFY(NAT_DETECTION_SOURCE_IP) NOTIFY(NAT_DETECTION_DESTINATION_IP) CERTREQ &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:25:49.939: IKEv2:(SESSION ID = 93,SA ID = 1):Completed SA init exchange&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;B&gt;Dec 12 16:25:49.939: IKEv2:(SESSION ID = 93,SA ID = 1):Starting timer (30 sec) to wait for auth message&lt;/B&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;B&gt;Dec 12 16:26:19.939: IKEv2-ERROR:(SESSION ID = 93,SA ID = 1):: Failed to receive the AUTH msg before the timer expired&lt;/B&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:26:19.939: IKEv2:(SESSION ID = 93,SA ID = 1):Auth exchange failed&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:26:19.939: IKEv2-ERROR:(SESSION ID = 93,SA ID = 1):: Auth exchange failed&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:26:19.940: IKEv2:(SESSION ID = 93,SA ID = 1):Abort exchange&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:26:19.940: IKEv2:(SESSION ID = 93,SA ID = 1):Deleting SA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:26:19.940: IKEv2:(SA ID = 1):[IKEv2 -&amp;gt; PKI] Close PKI Session&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Dec 12 16:26:19.940: IKEv2:(SA ID = 1):[PKI -&amp;gt; IKEv2] Closing of PKI Session PASSED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;csr1kv#&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;此问题已研究多日，目前还搞不定。请各位大神帮忙看看。。&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Dec 2018 08:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348318#M5656</guid>
      <dc:creator>wuhao0015</dc:creator>
      <dc:date>2018-12-12T08:27:40Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348319#M5657</link>
      <description>帖子上有好多表情啊。各位大神过来瞧瞧啊~！管理员我怎么不能编辑添加悬赏？能否帮忙设置回复给积分啊？？呵呵。</description>
      <pubDate>Wed, 12 Dec 2018 08:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348319#M5657</guid>
      <dc:creator>wuhao0015</dc:creator>
      <dc:date>2018-12-12T08:34:45Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348320#M5658</link>
      <description>楼主是基于证书来进行身份验证么？&lt;BR /&gt;先尝试只基于账号密码方式认证，看报错是认证这一步没过。</description>
      <pubDate>Thu, 13 Dec 2018 00:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348320#M5658</guid>
      <dc:creator>YilinChen</dc:creator>
      <dc:date>2018-12-13T00:53:09Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348321#M5659</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT size="2"&gt;&lt;A href="https://community.cisco.com/forum.php?mod=redirect&amp;amp;goto=findpost&amp;amp;pid=1032266&amp;amp;ptid=988534" target="_blank"&gt;&lt;FONT color="#999999"&gt;YilinChen 发表于 2018-12-13 08:53&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;楼主是基于证书来进行身份验证么？&lt;BR /&gt;先尝试只基于账号密码方式认证，看报错是认证这一步没过。&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;更改ikev2 profile配置使用anyconnect-eap认证，没有问题。&lt;BR /&gt;crypto ikev2 profile anyconnect-profile&lt;BR /&gt; match identity remote key-id *$AnyConnectClient$*&lt;BR /&gt; authentication local rsa-sig&lt;BR /&gt; authentication remote anyconnect-eap aggregate&lt;BR /&gt; pki trustpoint csr1kv.local&lt;BR /&gt; aaa authentication anyconnect-eap anyconnect&lt;BR /&gt; aaa authorization group anyconnect-eap list anyconnect anyconnect-auth-policy&lt;BR /&gt; aaa authorization user anyconnect-eap cached&lt;BR /&gt; virtual-template 1&lt;BR /&gt;=================&lt;BR /&gt;客户端配置&lt;BR /&gt;&lt;SERVERLIST&gt;&lt;BR /&gt;  &lt;HOSTENTRY&gt;&lt;BR /&gt;   &lt;HOSTNAME&gt;Company&lt;/HOSTNAME&gt;&lt;BR /&gt;   &lt;HOSTADDRESS&gt;202.100.1.100&lt;/HOSTADDRESS&gt;&lt;BR /&gt;   &lt;RIMARYPROTOCOL&gt;IPsec&lt;BR /&gt;   &lt;STANDARDAUTHENTICATIONONLY&gt;false&lt;BR /&gt;   &lt;/STANDARDAUTHENTICATIONONLY&gt;&lt;BR /&gt;   &lt;/RIMARYPROTOCOL&gt;&lt;BR /&gt;  &lt;/HOSTENTRY&gt;&lt;BR /&gt;&lt;/SERVERLIST&gt;&lt;BR /&gt;这样使用anyconnect连接没有问题。。</description>
      <pubDate>Thu, 13 Dec 2018 01:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348321#M5659</guid>
      <dc:creator>wuhao0015</dc:creator>
      <dc:date>2018-12-13T01:04:52Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348322#M5660</link>
      <description>anyconnect的IKEv2-个人证书认证已经解决。&lt;BR /&gt;上面配置中计算机的证书颁发没有问题。&lt;BR /&gt;问题在于ikev2的profile。附上正确的配置参考。&lt;BR /&gt;crypto pki certificate map ikev2-win-cert-map 10&lt;BR /&gt; issuer-name eq cn = ca.iteachs.com&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 profile ikev2-win-profile&lt;BR /&gt; match certificate ikev2-win-cert-map&lt;BR /&gt; identity local dn &lt;BR /&gt; authentication remote rsa-sig&lt;BR /&gt; authentication local rsa-sig&lt;BR /&gt; pki trustpoint csr1kv.iteachs.com&lt;BR /&gt; dpd 60 2 on-demand&lt;BR /&gt; aaa authorization group cert list ikev2-win ikev2-win-auth-policy&lt;BR /&gt; virtual-template 1&lt;BR /&gt;===========&lt;BR /&gt;还有点问题正在研究。&lt;BR /&gt;ca server开启后需要开启http server。但是anyconnect有时候会出现web auth required。导致无法连接。&lt;BR /&gt;请管理，将我的回复设置为最佳。</description>
      <pubDate>Fri, 14 Dec 2018 01:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348322#M5660</guid>
      <dc:creator>wuhao0015</dc:creator>
      <dc:date>2018-12-14T01:22:44Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348323#M5661</link>
      <description>开启http server后anyconnect有时候会出现web auth required的问题解决了。&lt;BR /&gt;在anyconnect vpn profile editor中将配置文件中的&lt;BR /&gt;disable captive portal detection 打勾即可。&lt;BR /&gt;效果完美</description>
      <pubDate>Fri, 14 Dec 2018 01:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348323#M5661</guid>
      <dc:creator>wuhao0015</dc:creator>
      <dc:date>2018-12-14T01:36:33Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348324#M5662</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT size="2"&gt;&lt;A href="https://community.cisco.com/forum.php?mod=redirect&amp;amp;goto=findpost&amp;amp;pid=1032311&amp;amp;ptid=988534" target="_blank"&gt;&lt;FONT color="#999999"&gt;wuhao0015 发表于 2018-12-14 09:36&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;开启http server后anyconnect有时候会出现web auth required的问题解决了。&lt;BR /&gt;在anyconnect vpn profile edi ...&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;感谢楼主分享解决方案。&lt;BR /&gt;帖子里都是表情的问题我们尽快查看一下。</description>
      <pubDate>Wed, 12 Dec 2018 08:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348324#M5662</guid>
      <dc:creator>Yanli Sun</dc:creator>
      <dc:date>2018-12-12T08:27:41Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348325#M5663</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT size="2"&gt;&lt;A href="https://community.cisco.com/forum.php?mod=redirect&amp;amp;goto=findpost&amp;amp;pid=1032249&amp;amp;ptid=988534" target="_blank"&gt;&lt;FONT color="#999999"&gt;wuhao0015 发表于 2018-12-12 16:34&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;帖子上有好多表情啊。各位大神过来瞧瞧啊~！管理员我怎么不能编辑添加悬赏？能否帮忙设置回复给积分啊？？ ...&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;帖子上表情问题已处理。谢谢！&lt;BR /&gt;在编辑器下方 - 点击附加选项 - 勾选文本特性中禁用表情 - 保存即可</description>
      <pubDate>Wed, 19 Dec 2018 11:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348325#M5663</guid>
      <dc:creator>one-time</dc:creator>
      <dc:date>2018-12-19T11:47:30Z</dc:date>
    </item>
    <item>
      <title>IOS IKEv2使用Anyconnect IKE-RSA无法连接</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348326#M5664</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT size="2"&gt;&lt;A href="https://community.cisco.com/forum.php?mod=redirect&amp;amp;goto=findpost&amp;amp;pid=1032517&amp;amp;ptid=988534" target="_blank"&gt;&lt;FONT color="#999999"&gt;管理员 发表于 2018-12-19 19:47&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;帖子上表情问题已处理。谢谢！&lt;BR /&gt;在编辑器下方 - 点击附加选项 - 勾选文本特性中禁用表情 - 保存即可&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;谢谢管理回复~~！</description>
      <pubDate>Wed, 19 Dec 2018 11:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/ios-ikev2%E4%BD%BF%E7%94%A8anyconnect-ike-rsa%E6%97%A0%E6%B3%95%E8%BF%9E%E6%8E%A5/m-p/4348326#M5664</guid>
      <dc:creator>wuhao0015</dc:creator>
      <dc:date>2018-12-19T11:49:55Z</dc:date>
    </item>
  </channel>
</rss>

