<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix 515e VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617528#M1036285</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still can't get this site to connect, i've put in this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp key xxxxxxxx address 0.0.0.0 netmask 0.0.0.0 no-xauth no-config-mode   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this seems to be the errors i'm getting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Nov 28 2006 14:55:48|713902: Group = DefaultRAGroup, IP = x.x.x.x, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;3|Nov 28 2006 14:55:48|713127: Group = DefaultRAGroup, IP = x.x.x.x,, Xauth required but selected Proposal does not support xauth,  Check priorities of ike xauth proposals in ike proposal list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does the remote peer use &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group = DefaultRAGroup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As part of the authentication process? As the guy from the IT company says there are not using a group name only a pre shared key?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;J mack&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Nov 2006 13:39:32 GMT</pubDate>
    <dc:creator>johnnymac</dc:creator>
    <dc:date>2006-11-28T13:39:32Z</dc:date>
    <item>
      <title>Pix 515e VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617526#M1036281</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are in the process of migrating from 506e verion 6.3 to a 515e Version 7.0(5). We have everything up and running now except for one remote site which is on a 172.16.0.0 network and connects via ADSL to an ISP then to an IT company who say they running a site to site VPN to us. Convoluted I know (we inherrited it). Here is the old part of the VPN config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac                                                     &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 1 set transform-set myset                                                   &lt;/P&gt;&lt;P&gt;crypto map dyn-map 20 ipsec-i                           &lt;/P&gt;&lt;P&gt;crypto map dyn-map interface outside                                    &lt;/P&gt;&lt;P&gt;isakmp enable outside                     &lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0 no-xauth no-config-mode                                                                           &lt;/P&gt;&lt;P&gt;isakmp identity address                       &lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20                       &lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share                                         &lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des                               &lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5                         &lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2                        &lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 43200                               &lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share                                         &lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des                               &lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5                         &lt;/P&gt;&lt;P&gt;isakmp policy 20 group 1                        &lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400                               &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 dns-server x.x.x.x&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 wins-server x.x.x.x&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 default-domain xxxxxx.net&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 split-tunnel nonat&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 7200&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And heres what I currently have on the new PIX for our client to site vpn which is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy vpn3000 internal&lt;/P&gt;&lt;P&gt;group-policy vpn3000 attributes&lt;/P&gt;&lt;P&gt; wins-server value x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt; dns-server value x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value vpn3000_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value parkside.net&lt;/P&gt;&lt;P&gt; split-dns value parkside.net&lt;/P&gt;&lt;P&gt;username ********* password ************* encrypted privilege 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http x.x.x.x x.x.x.x inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map Outside_dyn_map 20 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map Outside_map interface Outside&lt;/P&gt;&lt;P&gt;isakmp enable Outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 general-attributes&lt;/P&gt;&lt;P&gt; address-pool ippool&lt;/P&gt;&lt;P&gt; authentication-server-group Radius_Auth&lt;/P&gt;&lt;P&gt; default-group-policy vpn3000&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Guy at the IT company says i need to use this line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0 no-xauth no-config-mode     &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the policies, but i'm not sure which policies relate to what? This also feels far to simple for a site to site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;He also advised me i'd need to use this nonat access &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip host 1.x.x.x.16.0.0 255.255.0.0        &lt;/P&gt;&lt;P&gt; nat (inside) 0 access-list nonat   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone shed any light on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks &lt;/P&gt;&lt;P&gt;J Mack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617526#M1036281</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2019-03-11T09:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515e VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617527#M1036283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISAKMP policy is not related to specific VPN &lt;/P&gt;&lt;P&gt;Process of ISAKMP policy negotation is following &lt;/P&gt;&lt;P&gt;The initiator will offer the highest priority proposal (in ISAKMP policy highest priority means lowest number fe.  isakmp policy 10  has higher priority than isakmp policy 20) and the responder will search its locally  configured ISAKMP policies for a match. If there are none, the initiator will propose the next highest ISAKMP policy. This process will continue until the initiator has no proposals left to offer the responder. &lt;/P&gt;&lt;P&gt;So you can have as many policies you want but at least one policy must match&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT issues&lt;/P&gt;&lt;P&gt;Yes you need remove IPSec traffic from NAT process (because IPSEC doesnt cooperate with NAT well)&lt;/P&gt;&lt;P&gt;M.&lt;/P&gt;&lt;P&gt;hope that helps rate if it does&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 13:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617527#M1036283</guid>
      <dc:creator>m.sir</dc:creator>
      <dc:date>2006-11-28T13:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515e VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617528#M1036285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still can't get this site to connect, i've put in this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp key xxxxxxxx address 0.0.0.0 netmask 0.0.0.0 no-xauth no-config-mode   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this seems to be the errors i'm getting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Nov 28 2006 14:55:48|713902: Group = DefaultRAGroup, IP = x.x.x.x, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;3|Nov 28 2006 14:55:48|713127: Group = DefaultRAGroup, IP = x.x.x.x,, Xauth required but selected Proposal does not support xauth,  Check priorities of ike xauth proposals in ike proposal list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does the remote peer use &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group = DefaultRAGroup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As part of the authentication process? As the guy from the IT company says there are not using a group name only a pre shared key?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;J mack&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 13:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617528#M1036285</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2006-11-28T13:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515e VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617529#M1036286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The error tells you IKE Phase 1 failure - mismatched config in pr. Check with your partner to ensure both side has identical policies (isakmp policy 10)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 15:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-vpn/m-p/617529#M1036286</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-28T15:45:53Z</dc:date>
    </item>
  </channel>
</rss>

