<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN site  site with Digital certificate FAIL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124068#M1072251</link>
    <description>&lt;P&gt;Can you confirm the phase 2 policy is the same at both ends?&lt;/P&gt;
&lt;P&gt;Also confirm that the crypto maps are mirror images of one another.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jul 2020 07:50:38 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-07-23T07:50:38Z</dc:date>
    <item>
      <title>VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4120802#M1072105</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set up the ikv2 VPN with pre sharekay and everything worked, this was done by just modifying the preshare key and placing a digital certificate. Without eembarog although the certificate is loaded and in order the vpn indicates errors for the decryption of the CA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All truespoint are&amp;nbsp; correct&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_PROC_ID&lt;BR /&gt;IKEv2-PROTO-5: (648): Received valid parameteres in process id&lt;BR /&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_CHK_IF_PEER_CERT_NEEDS_TO_BE_FETCHED_FOR_PROF_SEL&lt;BR /&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: R_WAIT_AUTH Event: EV_GET_POLICY_BY_PEERID&lt;BR /&gt;IKEv2-PROTO-2: (648): Searching policy based on peer's identity 'serialNumber=A.A.A.A.A.A.A,c=UY,o=B.B.B.B.B ,cn=B.B.B.B.B. of type 'DER ASN1 DN'&lt;BR /&gt;IKEv2-PROTO-1: (648): Failed to locate an item in the database&lt;BR /&gt;IKEv2-PROTO-1: (648):&lt;BR /&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: R_VERIFY_AUTH Event: EV_AUTH_FAIL&lt;BR /&gt;IKEv2-PROTO-2: (648): Verification of peer's authentication data FAILED&lt;BR /&gt;IKEv2-PROTO-2: (648): Sending authentication failure notify&lt;BR /&gt;IKEv2-PROTO-5: Construct Notify Payload: AUTHENTICATION_FAILEDIKEv2-PROTO-2: (648): Building packet for encryption.&lt;BR /&gt;(648):&lt;BR /&gt;Payload contents:&lt;BR /&gt;(648): NOTIFY(AUTHENTICATION_FAILED)(648): Next payload: NONE, reserved: 0x0, length: 8&lt;BR /&gt;(648): Security protocol id: IKE, spi size: 0, type: AUTHENTICATION_FAILED&lt;BR /&gt;(648):&lt;BR /&gt;IKEv2-PROTO-2: (648): Sending Packet [To1.1.1.1.:500/From 2.2.2.2:500/VRF i0:f0]&lt;BR /&gt;(648): Initiator SPI : E521A4F646361EB0 - Responder SPI : 51094EACBA26A502 Message id: 1&lt;BR /&gt;(648): IKEv2 IKE_AUTH Exchange RESPONSEIKEv2-PROTO-3: (648): Next payload: ENCR, version: 2.0 (648): Exchange type: IKE_AUTH, flags: RESPONDER MSG-RESPONSE (648): Message id: 1, length: 88(648):&lt;BR /&gt;Payload contents:&lt;BR /&gt;(648): ENCR(648): Next payload: NOTIFY, reserved: 0x0, length: 60&lt;BR /&gt;(648): Encrypted data: 56 bytes&lt;BR /&gt;(648):&lt;BR /&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: AUTH_DONE Event: EV_FAIL&lt;BR /&gt;IKEv2-PROTO-2: (648): Auth exchange failed&lt;BR /&gt;IKEv2-PROTO-1: (648): Auth exchange failed&lt;BR /&gt;IKEv2-PROTO-1: (648): Auth exchange failed&lt;BR /&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: EXIT Event: EV_ABORT&lt;BR /&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: EXIT Event: EV_CHK_PENDING_ABORT&lt;BR /&gt;IKEv2-PROTO-5: (648): SM Trace-&amp;gt; SA: I_SPI=E521A4F646361EB0 R_SPI=51094EACBA26A502 (R) MsgID = 00000001 CurState: EXIT Event: EV_UPDATE_CAC_STATS&lt;BR /&gt;IKEv2-PROTO-2: (648): Abort exchange&lt;BR /&gt;IKEv2-PROTO-2: (648): Deleting SA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 17:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4120802#M1072105</guid>
      <dc:creator>HaroldCalderon</dc:creator>
      <dc:date>2020-07-17T17:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4121055#M1072108</link>
      <description>&lt;P&gt;When using certificates for authentication on a site-site VPN both peers must trust the other end's certificate - either via importing the certificate itself or by having a common trusted root CA.&lt;/P&gt;
&lt;P&gt;You haven't indicated which approach you are taking.&lt;/P&gt;
&lt;P&gt;The debug indicates this:&lt;/P&gt;
&lt;PRE&gt;Verification of peer's authentication data FAILED&lt;/PRE&gt;
&lt;P&gt;...which usually indicates one of the methods I mentioned has not been followed correctly.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 12:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4121055#M1072108</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-18T12:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4121326#M1072116</link>
      <description>&lt;P&gt;pre-shared key was working good then you moved this to cert based.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- now for the cert based are you using public cert or private cert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- how about the remote side are they also using a public cert or private cert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you both (remote and you) are using a public cert in that case you need to install a root cert/inter cert/ and you both side need identity cert (to get identity cert you need to generate a csr and get signed from root ca) once this get signed you need to import it in your ASA/Router.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"All truespoint are correct" have you imported the root ca? &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here to give you some start if you using public cert &lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html" target="_self"&gt;here&lt;/A&gt; how to get identity cert for vpn and &lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/117337-config-asa-router-00.html" target="_self"&gt;here&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;now if you using private cert i guess which will be very unlikely.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as Marvin said on this "Verification of peer's authentication data FAILED" this could be many reason it could be you have not configured cert based vpn properly.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2020 15:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4121326#M1072116</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-07-19T15:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4123889#M1072241</link>
      <description>&lt;P&gt;Hello and thanks, I had&amp;nbsp; to put down and up the ikv1 and ikv2 for all firewall inside group police and then up phase 1 .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Tunnel-id Local Remote Status Role&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;2356188877 x.x.x.x/500 x.x.x.x/500 READY RESPONDER&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Encr: AES-CBC, keysize: 256, Hash: SHA256, DH Grp:19, Auth sign: RSA, Auth verify: RSA&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Life/Active Time: 28800/18 sec&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;but now phase 2 does not Up.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show isakmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 540px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/79847i8E9717F8C1D3A158/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 526px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/79848i48A05B212DA59EC9/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;gj&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DEBUG&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-2: Certificate validation completed&lt;BR /&gt;IKEv2-PLAT-2: (565): Completed authentication for connection&lt;BR /&gt;IKEv2-PLAT-2: Build config mode reply: no request stored&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 1&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 3&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 4&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 5&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 7&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 8&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 9&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 10&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 11&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 12&lt;BR /&gt;IKEv2-PLAT-2: (565): Crypto Map: No proxy match on map VPN-SITE-TO-SITE seq 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-2: (564): IKEv2 session deregistered from session manager. Reason: 6&lt;BR /&gt;IKEv2-PLAT-2: (564): session manager killed ikev2 tunnel. Reason: IKE Delete&lt;BR /&gt;IKEv2-PLAT-2: (564): PSH cleanup&lt;BR /&gt;IKEv2-PLAT-5: Active ike sa request deleted&lt;BR /&gt;IKEv2-PLAT-5: Decrement count for incoming active&lt;BR /&gt;IKEv2-PLAT-2: (565): idle timeout set to: 30&lt;BR /&gt;IKEv2-PLAT-2: (565): session timeout set to: 0&lt;BR /&gt;IKEv2-PLAT-2: (565): group policy set to DfltGrpPolicy&lt;BR /&gt;IKEv2-PLAT-2: (565): class attr set&lt;BR /&gt;IKEv2-PLAT-2: (565): tunnel protocol set to: 0x4c&lt;BR /&gt;IKEv2-PLAT-2: (565): IPv4 filter ID not configured for connection&lt;BR /&gt;IKEv2-PLAT-2: (565): group lock set to: none&lt;BR /&gt;IKEv2-PLAT-2: (565): IPv6 filter ID not configured for connection&lt;BR /&gt;IKEv2-PLAT-2: (565): connection attribues set valid to TRUE&lt;BR /&gt;IKEv2-PLAT-2: (565): Successfully retrieved conn attrs&lt;BR /&gt;IKEv2-PLAT-2: (565): Session registration after conn attr retrieval PASSED, No error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DEBUG PROTOCOL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-2: (579): Processing IKE_AUTH message&lt;BR /&gt;IKEv2-PROTO-1: (579): &lt;STRONG&gt;Failed to find a matching policy&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IKEv2-PROTO-1: (579): Received Policies:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ESP: Proposal 1: AES-CBC-256 SHA384 Don't use ESN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IKEv2-PROTO-1: (579): Failed to find a matching policy&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IKEv2-PROTO-1: (579): Expected Policies:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IKEv2-PROTO-5: (579): Failed to verify the proposed policies&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IKEv2-PROTO-1: (579): Failed to find a matching policy&lt;/STRONG&gt;&lt;BR /&gt;IKEv2-PROTO-1: (579):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont understand why say&amp;nbsp;AES-CBC-256 SHA384 &lt;STRONG&gt;Don't use ESN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I have this for phase 1 and 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PHASE 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ipsec ikev2 ipsec-proposal NAME&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-384&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---------------------------------------&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PHASE 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ikev2 policy 50&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 19&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 28800&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;where Im wrong&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2020 23:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4123889#M1072241</guid>
      <dc:creator>HaroldCalderon</dc:creator>
      <dc:date>2020-07-22T23:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4123891#M1072242</link>
      <description>Thanks Marvin a lot, Now phase1 is Up phase 2 down hah</description>
      <pubDate>Wed, 22 Jul 2020 23:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4123891#M1072242</guid>
      <dc:creator>HaroldCalderon</dc:creator>
      <dc:date>2020-07-22T23:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124068#M1072251</link>
      <description>&lt;P&gt;Can you confirm the phase 2 policy is the same at both ends?&lt;/P&gt;
&lt;P&gt;Also confirm that the crypto maps are mirror images of one another.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 07:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124068#M1072251</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-07-23T07:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124077#M1072252</link>
      <description>&lt;P&gt;&lt;STRONG&gt;ESP: Proposal 1: AES-CBC-256 SHA384 Don't use ESN&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your phase 1 is up but phase 2 is failing could you double check you interesting traffic is matching at both sides. more likely the interesting is not matching up.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 07:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124077#M1072252</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-07-23T07:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124443#M1072264</link>
      <description>&lt;P&gt;All side by side is good, I mean local and remote ACL are similars.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More&amp;nbsp; Debug&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Payload contents:&lt;BR /&gt;(546): VID(546): Next payload: IDr, reserved: 0x0, length: 20&lt;BR /&gt;(546):&lt;BR /&gt;(546): af 74 03 41 c1 f5 81 6f c3 71 30 af d0 fb 26 60&lt;BR /&gt;(546): IDr(546): Next payload: CERT, reserved: 0x0, length: 121&lt;BR /&gt;(546): Id type: DER ASN1 DN, Reserved: 0x0 0x0&lt;BR /&gt;(546):&lt;BR /&gt;(546): 30 6f 31 0b 30 09 06 03 55 04 06 13 02 55 59 31&lt;BR /&gt;(546): 13 30 11 06 03 55 04 08 13 0a 4d 6f 6e 74 65 76&lt;BR /&gt;(546): 69 64 65 6f 31 18 30 16 06 03 55 04 05 13 0f 52&lt;BR /&gt;(546): 55 43 32 31 33 32 38 36 35 30 30 30 31 33 31 23&lt;BR /&gt;(546): 30 21 06 03 55 04 0a 13 1a 41 44 54 20 53 65 63&lt;BR /&gt;(546): 75 72 69 74 79 20 53 65 72 76 69 63 65 73 20 53&lt;BR /&gt;(546): 2e 41 2e 31 0c 30 0a 06 03 55 04 03 13 03 41 44&lt;BR /&gt;(546): 54&lt;BR /&gt;(546): CERT(546): Next payload: AUTH, reserved: 0x0, length: 1669&lt;BR /&gt;(546): Cert encoding X.509 Certificate - signature&lt;BR /&gt;(546): Cert data: 1664 bytes&lt;BR /&gt;(546): AUTH(546): Next payload: NOTIFY, reserved: 0x0, length: 264&lt;BR /&gt;(546): Auth method RSA, reserved: 0x0, reserved 0x0&lt;BR /&gt;(546): Auth data: 256 bytes&lt;BR /&gt;(546): NOTIFY(NO_PROPOSAL_CHOSEN)(546): Next payload: NONE, reserved: 0x0, length: 8&lt;BR /&gt;(546): Security protocol id: IKE, spi size: 0, type: &lt;STRONG&gt;NO_PROPOSAL_CHOSEN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-2: (20): Processing IKE_AUTH message&lt;BR /&gt;IKEv2-PROTO-1: (20): Failed to find a matching policy&lt;BR /&gt;IKEv2-PROTO-1: (20): Received Policies:&lt;BR /&gt;ESP: Proposal 1: AES-CBC-256 SHA256 Don't use ESN&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-1: (20): Failed to find a matching policy&lt;BR /&gt;IKEv2-PROTO-1: (20): Expected Policies:&lt;BR /&gt;IKEv2-PROTO-5: (20): Failed to verify the proposed policies&lt;BR /&gt;IKEv2-PROTO-1: (20): Failed to find a matching policy&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 18:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124443#M1072264</guid>
      <dc:creator>HaroldCalderon</dc:creator>
      <dc:date>2020-07-23T18:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124450#M1072266</link>
      <description>&lt;P&gt;what PRF values configured on the ASA and on the remote side?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 18:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124450#M1072266</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-07-23T18:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site  site with Digital certificate FAIL</title>
      <link>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124456#M1072267</link>
      <description>&lt;P&gt;I understand that neither, because he is a fortigate firewall, Im going to talk back with him. Thanks Salim&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 18:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-site-site-with-digital-certificate-fail/m-p/4124456#M1072267</guid>
      <dc:creator>HaroldCalderon</dc:creator>
      <dc:date>2020-07-23T18:41:24Z</dc:date>
    </item>
  </channel>
</rss>

