<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ipsec VPN Tunnel between Debian host and Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044709#M1067718</link>
    <description>&lt;P&gt;Thanks for the answer.&lt;BR /&gt;The ASA is on provider side - so I can't change group or security settings.&lt;BR /&gt;I'll try to get debug log.&lt;/P&gt;&lt;PRE&gt;debug crypto isakmp 127
debug crypto ipsec 127
debug crypto peer condition x.x.x.x&lt;/PRE&gt;&lt;P&gt;Can you check, maybe I made a mistake in the config regarding the inputs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Mar 2020 05:58:16 GMT</pubDate>
    <dc:creator>Svyat</dc:creator>
    <dc:date>2020-03-12T05:58:16Z</dc:date>
    <item>
      <title>ipsec VPN Tunnel between Debian host and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044535#M1067701</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We trying to setup tonnel between our Debian host and Cisco ASA&amp;nbsp;5585X.&lt;/P&gt;&lt;P&gt;The phase 1 passed well and we have established connection.&lt;/P&gt;&lt;P&gt;Howewer, we have error on phase 2&lt;/P&gt;&lt;PRE&gt;Mar 11 20:04:34 host charon[15239]: 09[IKE] received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
Mar 11 20:04:34 host charon[15239]: 09[IKE] failed to establish CHILD_SA, keeping IKE_SA&lt;/PRE&gt;&lt;P&gt;We know that is wrong&amp;nbsp;esp config - but can't solve it.&lt;/P&gt;&lt;P&gt;Could you help me please?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;The inputs:&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Technical Information&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;VPN Gateway Information&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;Cisco ASA 5585X&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;ipsec&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Tunnel mode (transport/tunnel)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;tunnel&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;tunnel&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Peer IP Address&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;5.0.0.90&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;1.0.0.42&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;IP address SHEP/VSHEP (subnet)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;5.0.1.0/24&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;&amp;nbsp;0.0.0.0/24&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Tunnel Properties&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Authentication Method&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;PSK&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;PSK&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Private Shared Key&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;via SMS&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;via SMS&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Cryptography Type&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;IKEv2&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;IKEv2&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Diffie-Hellman Group&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;Group 14&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;Group 14&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Cryptography Algorithm&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;AES-CBC-256&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;AES-CBC-256&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Hash Algorithm&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;SHA 256&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;SHA 256&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Lifetime (for renegotiation)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;default&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;default&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Tunnel Properties&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Encapsulation (ESP or AH)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;ESP&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;ESP&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Cryptography Algorithm&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;AES 256&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;AES 256&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Algorithm Method&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;SHA 256&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;SHA 256&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Perfect Forward Secrecy&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;Group 14&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;Group 14&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Lifetime (for renegotiation)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;default&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;default&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;Lifesize in KB (for renegotiation)&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;default&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV&gt;default&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;STRONG&gt;ipsec.config&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;PRE&gt;config setup
        charondebug="all"
        strictcrlpolicy=no
        uniqueids=yes
conn Host-to-ASA
        keyexchange=ikev2
        mobike=no
        fragmentation=yes
        auto=start
        type=tunnel
        authby=psk
        keyingtries=%forever
        left=1.0.0.42
        leftid=1.0.0.42
        leftsubnet=0.0.0.0/0

## Destination LAN
        right=5.0.0.90
        rightsubnet=5.0.1.0/24
        ike=aes256-sha256-modp2048!
        esp=aes256-sha256-modp2048!&lt;/PRE&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;STRONG&gt;# ipsec statusall&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;PRE&gt;# ipsec statusall
Status of IKE charon daemon (strongSwan 5.7.2, Linux 4.19.0-6-amd64, x86_64):
  uptime: 5 minutes, since Mar 11 20:04:33 2020
  malloc: sbrk 2830336, mmap 0, used 695920, free 2134416
  worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 2
  loaded plugins: charon addrblock agent attr certexpire connmark constraints counters dhcp dnskey eap-aka eap-gtc eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls eap-tnc eap-ttls error-notify farp fips-prf gcm gmp led lookip md5 mgf1 openssl pem pgp pkcs1 pkcs12 pkcs7 pkcs8 pubkey random rc2 resolve revocation sshkey tnc-tnccs unity vici x509 xauth-eap xauth-generic xauth-pam xcbc nonce aes sha1 sha2 hmac stroke kernel-netlink socket-default updown
Listening IP addresses:
  1.0.0.42
Connections:
  Host-to-ASA:  1.0.0.42...5.0.0.90  IKEv2
  Host-to-ASA:   local:  [1.0.0.42] uses pre-shared key authentication
  Host-to-ASA:   remote: [5.0.0.90] uses pre-shared key authentication
  Host-to-ASA:   child:  0.0.0.0/0 === 5.0.1.0/24 TUNNEL
Security Associations (1 up, 0 connecting):
  Host-to-ASA[1]: ESTABLISHED 5 minutes ago, 1.0.0.42[1.0.0.42]...5.0.0.90[5.0.0.90]
  Host-to-ASA[1]: IKEv2 SPIs: 4e7a3605sdfer50f7_i* 850fssdfrgt1f4af7_r, pre-shared key reauthentication in 2 hours
  Host-to-ASA[1]: IKE proposal: AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048&lt;/PRE&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;STRONG&gt;connection log from my host&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;PRE&gt;Mar 11 20:04:31 host ipsec_starter[14586]: ipsec starter stopped
Mar 11 20:04:33 host ipsec_starter[15215]: Starting strongSwan 5.7.2 IPsec [starter]...
Mar 11 20:04:33 host ipsec_starter[15215]: !! Your strongswan.conf contains manual plugin load options for charon.
Mar 11 20:04:33 host ipsec_starter[15215]: !! This is recommended for experts only, see
Mar 11 20:04:33 host ipsec_starter[15215]: !! http://wiki.strongswan.org/projects/strongswan/wiki/PluginLoad
Mar 11 20:04:34 host charon[15239]: 00[DMN] Starting IKE charon daemon (strongSwan 5.7.2, Linux 4.19.0-6-amd64, x86_64)
Mar 11 20:04:34 host charon[15239]: 00[NET] could not open socket: Address family not supported by protocol
Mar 11 20:04:34 host charon[15239]: 00[NET] could not open IPv6 socket, IPv6 disabled
Mar 11 20:04:34 host charon[15239]: 00[KNL] received netlink error: Address family not supported by protocol (97)
Mar 11 20:04:34 host charon[15239]: 00[KNL] unable to create IPv6 routing table rule
Mar 11 20:04:34 host charon[15239]: 00[CFG] loaded 0 RADIUS server configurations
Mar 11 20:04:34 host charon[15239]: 00[CFG] HA config misses local/remote address
Mar 11 20:04:34 host charon[15239]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Mar 11 20:04:34 host charon[15239]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Mar 11 20:04:34 host charon[15239]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Mar 11 20:04:34 host charon[15239]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Mar 11 20:04:34 host charon[15239]: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Mar 11 20:04:34 host charon[15239]: 00[CFG] loading secrets from '/etc/ipsec.secrets'
Mar 11 20:04:34 host charon[15239]: 00[CFG]   loaded IKE secret for 1.0.0.42 5.0.0.90
Mar 11 20:04:34 host charon[15239]: 00[CFG]   loaded IKE secret for 1.0.0.42
Mar 11 20:04:34 host charon[15239]: 00[LIB] loaded plugins: charon addrblock agent attr certexpire connmark constraints counters dhcp dnskey eap-aka eap-gtc eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls eap-tnc eap-ttls error-notify farp fips-prf gcm gmp led lookip md5 mgf1 openssl pem pgp pkcs1 pkcs12 pkcs7 pkcs8 pubkey random rc2 resolve revocation sshkey tnc-tnccs unity vici x509 xauth-eap xauth-generic xauth-pam xcbc nonce aes sha1 sha2 hmac stroke kernel-netlink socket-default updown
Mar 11 20:04:34 host charon[15239]: 00[LIB] dropped capabilities, running as uid 0, gid 0
Mar 11 20:04:34 host charon[15239]: 00[JOB] spawning 16 worker threads
Mar 11 20:04:34 host ipsec_starter[15238]: charon (15239) started after 40 ms
Mar 11 20:04:34 host charon[15239]: 05[CFG] received stroke: add connection 'Host-to-ASA'
Mar 11 20:04:34 host charon[15239]: 05[CFG] added configuration 'Host-to-ASA'
Mar 11 20:04:34 host charon[15239]: 07[CFG] received stroke: initiate 'Host-to-ASA'
Mar 11 20:04:34 host charon[15239]: 07[IKE] initiating IKE_SA Host-to-ASA[1] to 5.0.0.90
Mar 11 20:04:34 host charon[15239]: 07[IKE] initiating IKE_SA Host-to-ASA[1] to 5.0.0.90
Mar 11 20:04:34 host charon[15239]: 07[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Mar 11 20:04:34 host charon[15239]: 07[NET] sending packet: from 1.0.0.42[500] to 5.0.0.90[500] (464 bytes)
Mar 11 20:04:34 host charon[15239]: 10[NET] received packet: from 5.0.0.90[500] to 1.0.0.42[500] (574 bytes)
Mar 11 20:04:34 host charon[15239]: 10[ENC] parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) V ]
Mar 11 20:04:34 host charon[15239]: 10[IKE] received Cisco Delete Reason vendor ID
Mar 11 20:04:34 host charon[15239]: 10[IKE] received Cisco Copyright (c) 2009 vendor ID
Mar 11 20:04:34 host charon[15239]: 10[IKE] received FRAGMENTATION vendor ID
Mar 11 20:04:34 host charon[15239]: 10[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Mar 11 20:04:34 host charon[15239]: 10[IKE] authentication of '1.0.0.42' (myself) with pre-shared key
Mar 11 20:04:34 host charon[15239]: 10[IKE] establishing CHILD_SA Host-to-ASA{1}
Mar 11 20:04:34 host charon[15239]: 10[IKE] establishing CHILD_SA Host-to-ASA{1}
Mar 11 20:04:34 host charon[15239]: 10[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Mar 11 20:04:34 host charon[15239]: 10[NET] sending packet: from 1.0.0.42[500] to 5.0.0.90[500] (256 bytes)
Mar 11 20:04:34 host charon[15239]: 09[NET] received packet: from 5.0.0.90[500] to 1.0.0.42[500] (160 bytes)
Mar 11 20:04:34 host charon[15239]: 09[ENC] parsed IKE_AUTH response 1 [ V IDr AUTH N(NO_PROP) ]
Mar 11 20:04:34 host charon[15239]: 09[IKE] authentication of '5.0.0.90' with pre-shared key successful
Mar 11 20:04:34 host charon[15239]: 09[IKE] IKE_SA Host-to-ASA[1] established between 1.0.0.42[1.0.0.42]...5.0.0.90[5.0.0.90]
Mar 11 20:04:34 host charon[15239]: 09[IKE] IKE_SA Host-to-ASA[1] established between 1.0.0.42[1.0.0.42]...5.0.0.90[5.0.0.90]
Mar 11 20:04:34 host charon[15239]: 09[IKE] scheduling reauthentication in 10176s
Mar 11 20:04:34 host charon[15239]: 09[IKE] maximum IKE_SA lifetime 10716s
Mar 11 20:04:34 host charon[15239]: 09[IKE] received NO_PROPOSAL_CHOSEN notify, no CHILD_SA built
Mar 11 20:04:34 host charon[15239]: 09[IKE] failed to establish CHILD_SA, keeping IKE_SA&lt;/PRE&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;STRONG&gt;Log from ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;4 Mar 11 2020 15:33:25 750003 Local:5.0.0.90:500 Remote:1.0.0.42:500 Username:91.215.139.42 IKEv2 Negotiation aborted due to ERROR: Failed to find a matching policy&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 20:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044535#M1067701</guid>
      <dc:creator>Svyat</dc:creator>
      <dc:date>2020-03-11T20:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec VPN Tunnel between Debian host and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044539#M1067702</link>
      <description>&lt;P&gt;could you run this command on ASA and display the output&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;debug crypto isakmp 127&lt;BR /&gt;&lt;/EM&gt;&lt;EM&gt;debug crypto ipsec 127&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;debug crypto peer condition x.x.x.x&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 20:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044539#M1067702</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-11T20:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec VPN Tunnel between Debian host and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044579#M1067706</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Verify that your IPsec settings are matching on both sides. If that is done and still doesn't work, i would lower the security level (like disable PFS or use a lower group number, use 3des instead of aes, and MD5 instead of SHA), sometimes, the most secure algorithms are supported to be configured but may fail to work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 22:02:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044579#M1067706</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-11T22:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec VPN Tunnel between Debian host and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044581#M1067707</link>
      <description>&lt;P&gt;3des is a weak encryption. lower down mean you compromising the network.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 22:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044581#M1067707</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-11T22:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec VPN Tunnel between Debian host and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044709#M1067718</link>
      <description>&lt;P&gt;Thanks for the answer.&lt;BR /&gt;The ASA is on provider side - so I can't change group or security settings.&lt;BR /&gt;I'll try to get debug log.&lt;/P&gt;&lt;PRE&gt;debug crypto isakmp 127
debug crypto ipsec 127
debug crypto peer condition x.x.x.x&lt;/PRE&gt;&lt;P&gt;Can you check, maybe I made a mistake in the config regarding the inputs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 05:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044709#M1067718</guid>
      <dc:creator>Svyat</dc:creator>
      <dc:date>2020-03-12T05:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec VPN Tunnel between Debian host and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044875#M1067727</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;&amp;nbsp;The recommendation to lower down the security level, was only temporary for testing purposes, to avoid available features that don't actually work. In my experience, it happened a lot that whenever i was an early adopter of some new technology (maybe not that new, but nobody was using it to detect bugs, like for example using the strongest DH groups, or EH), that it didn't work, due to bugs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 11:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4044875#M1067727</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-12T11:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec VPN Tunnel between Debian host and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4045155#M1067740</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that the problem was on the provider side.&lt;BR /&gt;We managed to get phase 2.&lt;BR /&gt;Thank you for the answers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;, right first command:&lt;/P&gt;&lt;PRE&gt;debug crypto condition peer x.x.x.x&lt;/PRE&gt;</description>
      <pubDate>Thu, 12 Mar 2020 18:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-tunnel-between-debian-host-and-cisco-asa/m-p/4045155#M1067740</guid>
      <dc:creator>Svyat</dc:creator>
      <dc:date>2020-03-12T18:11:18Z</dc:date>
    </item>
  </channel>
</rss>

