<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vpn client address assignment with certificate authenticatio in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vpn-client-address-assignment-with-certificate-authentication/m-p/1040626#M2190</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The config lacks authorization part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use either ISAKMP Profile:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp authorization list list-name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map map-name isakmp authorization list list-name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, I don't like your config as it uses both crypto map EasyVPN features and ISAKMP Profile EasyVPN features. If you are able to classify all of you EasyVPN users with Profiles then don't use commands like "crypto map vpnmap1 client configuration address respond". Use ISAKMP Profile command to configure it. Or better use ISAKMP Profiles and VTI interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, verify that your users are classified into the correct Profile with "show cry isa sa det" or "show cry isa peers det".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 27 Sep 2008 09:38:14 GMT</pubDate>
    <dc:creator>ovt</dc:creator>
    <dc:date>2008-09-27T09:38:14Z</dc:date>
    <item>
      <title>vpn client address assignment with certificate authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-client-address-assignment-with-certificate-authentication/m-p/1040625#M2186</link>
      <description>&lt;P&gt;I have the following config and I can not get the client to pull an ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto pki trustpoint dc-ho1&lt;/P&gt;&lt;P&gt; enrollment mode ra&lt;/P&gt;&lt;P&gt; enrollment url &lt;A class="jive-link-custom" href="http://10.10.20.2:80/certsrv/mscep/mscep.dll" target="_blank"&gt;http://10.10.20.2:80/certsrv/mscep/mscep.dll&lt;/A&gt;&lt;/P&gt;&lt;P&gt; serial-number none&lt;/P&gt;&lt;P&gt; fqdn HOEDTVPN.edt.net&lt;/P&gt;&lt;P&gt; ip-address none&lt;/P&gt;&lt;P&gt; password 7 0350792F532D761F1B5B4F564E30525921&lt;/P&gt;&lt;P&gt; subject-name O=EDT, OU=VPN, C=US, ST=Tx&lt;/P&gt;&lt;P&gt; revocation-check crl&lt;/P&gt;&lt;P&gt; rsakeypair HOEDTVPN.edt.net&lt;/P&gt;&lt;P&gt; auto-enroll&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate map cert_map 10&lt;/P&gt;&lt;P&gt; subject-name co ou = vpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group VPN&lt;/P&gt;&lt;P&gt; dns 10.10.20.2&lt;/P&gt;&lt;P&gt; wins 10.10.20.2&lt;/P&gt;&lt;P&gt; domain edg.net&lt;/P&gt;&lt;P&gt; pool hoedtvpn&lt;/P&gt;&lt;P&gt; acl 101&lt;/P&gt;&lt;P&gt; netmask 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp profile VPN_client&lt;/P&gt;&lt;P&gt;   ca trust-point dc-ho1&lt;/P&gt;&lt;P&gt;   match certificate cert_map&lt;/P&gt;&lt;P&gt;   client configuration address respond&lt;/P&gt;&lt;P&gt;   client configuration group VPN&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnclient 20&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map vpnmap1 local-address GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;crypto map vpnmap1 client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map vpnmap1 20 ipsec-isakmp dynamic vpnclient&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description External Interface&lt;/P&gt;&lt;P&gt; ip address 64.XX.XX.XXX 255.255.255.248&lt;/P&gt;&lt;P&gt; ip access-group 111 in&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type rj45&lt;/P&gt;&lt;P&gt; crypto map vpnmap1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool hoedtvpn 10.20.90.1 10.20.90.126&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.0.0.0 0.0.0.255 10.20.90.0 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 111 remark SDM_ACL Category=17&lt;/P&gt;&lt;P&gt;access-list 111 remark Auto generated by SDM for NTP (123) 10.10.20.2&lt;/P&gt;&lt;P&gt;access-list 111 permit udp host 10.10.20.2 eq ntp host 64.XX.xx.XXX eq ntp&lt;/P&gt;&lt;P&gt;access-list 111 permit udp any any eq isakmp&lt;/P&gt;&lt;P&gt;access-list 111 permit udp any any eq non500-isakmp&lt;/P&gt;&lt;P&gt;access-list 111 permit icmp any any&lt;/P&gt;&lt;P&gt;access-list 111 permit tcp any any eq 22&lt;/P&gt;&lt;P&gt;access-list 111 permit tcp any any eq telnet&lt;/P&gt;&lt;P&gt;access-list 111 permit gre any any&lt;/P&gt;&lt;P&gt;access-list 111 permit esp any any&lt;/P&gt;&lt;P&gt;access-list 111 permit tcp any any eq 10000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I assign the pool directly under isakmp it will work but does not provide the other needed attributes, dns, wins ect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when debug I get &lt;/P&gt;&lt;P&gt;Sep 23 14:48:24.090: ISAKMP:(7177):attributes sent in message:&lt;/P&gt;&lt;P&gt;Sep 23 14:48:24.090:         Address: 0.2.0.0&lt;/P&gt;&lt;P&gt;Sep 23 14:48:24.090: ISAKMP:(7177):No IP address pool defined for ISAKMP!&lt;/P&gt;&lt;P&gt;Sep 23 14:48:24.090: ISAKMP:(7177):peer does not do paranoid keepalives.&lt;/P&gt;&lt;P&gt;Sep 23 14:48:24.090: ISAKMP:(7177):deleting SA reason "Fail to allocate ip address" state (R) CONF_ADDR     (peer 24.XXX.XX.XX)&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-client-address-assignment-with-certificate-authentication/m-p/1040625#M2186</guid>
      <dc:creator>jdedon</dc:creator>
      <dc:date>2020-02-21T18:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: vpn client address assignment with certificate authenticatio</title>
      <link>https://community.cisco.com/t5/network-access-control/vpn-client-address-assignment-with-certificate-authentication/m-p/1040626#M2190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The config lacks authorization part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use either ISAKMP Profile:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp authorization list list-name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map map-name isakmp authorization list list-name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, I don't like your config as it uses both crypto map EasyVPN features and ISAKMP Profile EasyVPN features. If you are able to classify all of you EasyVPN users with Profiles then don't use commands like "crypto map vpnmap1 client configuration address respond". Use ISAKMP Profile command to configure it. Or better use ISAKMP Profiles and VTI interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, verify that your users are classified into the correct Profile with "show cry isa sa det" or "show cry isa peers det".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Sep 2008 09:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vpn-client-address-assignment-with-certificate-authentication/m-p/1040626#M2190</guid>
      <dc:creator>ovt</dc:creator>
      <dc:date>2008-09-27T09:38:14Z</dc:date>
    </item>
  </channel>
</rss>

