<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD IKE/IPSec VPN site to site certificate authentication  error in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044459#M1110069</link>
    <description>&lt;P&gt;This crypto map done by fmc not by cli? Am I correct&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CSM_IPSEC_ACL_3 &amp;lt;- this acl permit traffic from which to which LAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 19 Mar 2024 20:58:23 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-03-19T20:58:23Z</dc:date>
    <item>
      <title>FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043467#M1110013</link>
      <description>&lt;P&gt;hello all ,&lt;/P&gt;&lt;P&gt;recently i tried to configure VPN site to site with certificate authentication type, i got the certificate signed by a third party autority , and when i did the debugs i got this log :&lt;/P&gt;&lt;P&gt;CRYPTO_PKI: bitValue of KEY_USAGE = a0PKI[7]: CRYPTO_PKI:check_key_usage: Checking KU for case VPN peer certs.&lt;/P&gt;&lt;P&gt;PKI[7]: CRYPTO_PKI:check_key_usage: KU bit digitalSignature is ON.&lt;/P&gt;&lt;P&gt;PKI[7]: ExtendedKeyUsage OID = serverAuth NOT acceptable for usage type IPSEC VPN Peer&lt;/P&gt;&lt;P&gt;PKI[4]: check_key_usage: No acceptable ExtendedKeyUsage OIDs found&lt;/P&gt;&lt;P&gt;PKI[7]: check_key_usage: IGNORING IPSec Key Usage check failure&lt;/P&gt;&lt;P&gt;PKI[12]: pki_ossl_do_callback, pki_ossl_validate.c:164&lt;/P&gt;&lt;P&gt;PKI[9]: Async unlocked for session 0x9a679795&lt;/P&gt;&lt;P&gt;PKI[12]: CERT_VerifyData, vpn3k_cert_api.c:603&lt;/P&gt;&lt;P&gt;PKI[9]: CERT API thread sleeps!&lt;/P&gt;&lt;P&gt;i saw some documentation that recommend to apply the&amp;nbsp;ignore-ipsec-keyusage&amp;nbsp; , even the support suggest to apply this command on the trustpoint and that what i did :&lt;/P&gt;&lt;P&gt;sh run cry ca trustpoint VPN&lt;/P&gt;&lt;P&gt;crypto ca trustpoint VPN&lt;/P&gt;&lt;P&gt;keypair VPN_BA_AGB&lt;/P&gt;&lt;P&gt;ignore-ipsec-keyusage &amp;lt;---&lt;/P&gt;&lt;P&gt;crl configure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i also checked the option : ignore ipsec key usage on the enroulement in key tab ,&lt;/P&gt;&lt;P&gt;and this is an other recommendation of support :&lt;/P&gt;&lt;P&gt;The recommendation is to get the right EKU/OID on the certificate in order for the firewall to be able to use it for IPSec VPN certificate authentication&lt;/P&gt;&lt;P&gt;but the CA authority confirm to me that they do that with other vendors and it works fine and they can not change th EKU cause this is not allowed ,&lt;/P&gt;&lt;P&gt;is there any way to force FTD to escape the EKU check ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 08:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043467#M1110013</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T08:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043704#M1110015</link>
      <description>&lt;P&gt;you use FMC to mgmt FTD?\&lt;/P&gt;
&lt;P&gt;under FMC cert. you can select ignore the keyusage&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (200).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213138i50E2CDA6F0BA903B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (200).png" alt="Screenshot (200).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 11:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043704#M1110015</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T11:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043800#M1110019</link>
      <description>&lt;P&gt;thanks for the replay ,&lt;/P&gt;&lt;P&gt;i alredy did select the ignore the key usage :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="soufiansaheb_0-1710848806476.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213140i53C22E63E0C9FD7F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="soufiansaheb_0-1710848806476.png" alt="soufiansaheb_0-1710848806476.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and even i used Flexconfig to ignore the ipsec keyusage as follow :&lt;/P&gt;&lt;P&gt;crypto ca trustpoint VPN&lt;BR /&gt;keypair VPN_BA_AGB&lt;BR /&gt;ignore-ipsec-keyusage&lt;BR /&gt;crl configure&lt;/P&gt;&lt;P&gt;i hope there is another way to ignore this check&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 11:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043800#M1110019</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T11:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044054#M1110024</link>
      <description>&lt;PRE id="wp2485454775__ID-3899-00000df7" class="pre codeblock"&gt;&lt;CODE&gt;&amp;gt; &lt;KBD class="userinput"&gt;&lt;STRONG class="ph userinput"&gt;show crypto ca trustpoints&lt;/STRONG&gt;&lt;/KBD&gt;
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;can you check if command we config via flexconfig is successfully add to FTD&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 14:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044054#M1110024</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T14:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044111#M1110027</link>
      <description>&lt;P&gt;thanks for the replay :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sho run crypto ca trustpoint VPN&lt;/STRONG&gt;&lt;BR /&gt;crypto ca trustpoint VPN&lt;BR /&gt;keypair VPN_BA_AGB&lt;BR /&gt;ignore-ipsec-keyusage&lt;BR /&gt;crl configure&lt;/P&gt;&lt;P&gt;sho crypto ca trustpoints VPN&lt;/P&gt;&lt;P&gt;Trustpoint VPN:&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=xxxxxxxxxxxxxx&lt;BR /&gt;o=xxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;c=XX&lt;BR /&gt;Serial Number: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;Certificate configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 15:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044111#M1110027</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T15:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044139#M1110028</link>
      <description>&lt;P&gt;&lt;A href="https://bst.cisco.com/quickview/bug/CSCvp56951" target="_blank"&gt;Cisco Bug: CSCvp56951 - FDM/FTDvirtual unable to support/deploy "ignore-ipsec-keyusage" flexconfig object&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;check this bug&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 15:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044139#M1110028</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T15:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044163#M1110029</link>
      <description>&lt;P&gt;This is the only and absolutely correct way to ignore EKU check on received certificates. And from the debug it is evident that the command "ignore-ipsec-keyusage" works as expected (below in bold):&lt;/P&gt;&lt;PRE&gt;PKI[7]: CRYPTO_PKI:check_key_usage: KU bit digitalSignature is ON.&lt;BR /&gt;PKI[7]: ExtendedKeyUsage OID = serverAuth NOT acceptable for usage type IPSEC VPN Peer&lt;BR /&gt;PKI[4]: check_key_usage: No acceptable ExtendedKeyUsage OIDs found&lt;BR /&gt;&lt;STRONG&gt;PKI[7]: check_key_usage: IGNORING IPSec Key Usage check failure&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;Alternatively you can use CA which can generate certs with proper KU and EKU set. So far as I remember, the KU should contain bit Digital Signature and EKU should contain id-kp-ipsecEndSystem (1.3.6.1.5.5.7.3.5) or id-kp-ipsecTunnel (1.3.6.1.5.5.7.3.6) or id-kp-clientAuth (1.3.6.1.5.5.7.3.2) or id-kp-ipsecUser (1.3.6.1.5.5.7.3.7). The serverAuth EKU is good when ASA/FTD responds to client end systems. For L2L VPN this EKU indeed looks a bit strange, that is why it is not accepted by default for L2L.&lt;/P&gt;&lt;P&gt;If your tunnel is not established, it is due to something else and not due to wrong EKU.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 15:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044163#M1110029</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-19T15:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044365#M1110038</link>
      <description>&lt;P&gt;Indeed it can cert. Is accept&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IKEv2-PROTO-4: (2793): Verification of peer's authenctication data &lt;STRONG&gt;PASSED&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check the acl of vpn in both side' the acl dont match any crypto map seq&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 18:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044365#M1110038</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T18:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044385#M1110042</link>
      <description>&lt;P&gt;what i don't understand is when i change to pre shared key the VPN works fine&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 19:12:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044385#M1110042</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T19:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044394#M1110044</link>
      <description>&lt;P&gt;this is the the out put of debug crypto ca 14 :&lt;/P&gt;&lt;P&gt;CRYPTO_PKI: bitValue of KEY_USAGE = a0PKI[7]: CRYPTO_PKI:check_key_usage: Checking KU for case VPN peer certs.&lt;BR /&gt;PKI[7]: CRYPTO_PKI:check_key_usage: KU bit digitalSignature is ON.&lt;BR /&gt;PKI[7]: ExtendedKeyUsage OID = serverAuth NOT acceptable for usage type IPSEC VPN Peer&lt;BR /&gt;PKI[4]: check_key_usage: No acceptable ExtendedKeyUsage OIDs found&lt;BR /&gt;PKI[7]: check_key_usage: IGNORING IPSec Key Usage check failure&lt;BR /&gt;PKI[12]: pki_ossl_do_callback, pki_ossl_validate.c:164&lt;BR /&gt;PKI[9]: Async unlocked for session 0x3e3190cd&lt;BR /&gt;PKI[12]: CERT_VerifyData, vpn3k_cert_api.c:603&lt;BR /&gt;PKI[9]: CERT API thread sleeps!&lt;BR /&gt;PKI[13]: CERT_GetPeerCertValidityEndTime, vpn3k_cert_api.c:3489&lt;BR /&gt;PKI[12]: asn1_to_unix_time, crypto_pki.c:1720&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[13]: CERT_SignData, vpn3k_cert_api.c:361&lt;BR /&gt;PKI[14]: map_status, vpn3k_cert_api.c:2512&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[13]: CERT_Close, vpn3k_cert_api.c:291&lt;BR /&gt;PKI[8]: Close session 0x47861677 synchronously&lt;BR /&gt;PKI[13]: pki_ossl_free_valctx, pki_ossl_validate.c:251&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and this for debug crypto ikev2 protocol 255 in attachement&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 19:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044394#M1110044</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T19:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044402#M1110047</link>
      <description>&lt;P&gt;Peer doesn't respond to CREATE_CHILD_SA request. You need to collect logs/debugs from both sides at once, otherwise it's difficult to say something, because debugs depend on initiator/responder roles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 19:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044402#M1110047</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-19T19:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044437#M1110063</link>
      <description>&lt;P&gt;thanks for the replay ,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;unfortunatley i don't have control on the peer side , i'll ask them to give me some logs if it is possible&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044437#M1110063</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T20:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044441#M1110064</link>
      <description>&lt;PRE class="bp-text bp-text-plain hljs bp-is-scrollable" tabindex="0"&gt;&lt;CODE class="bp-text-code txt"&gt;(1986):  TSi(1986):   Next payload: TSr, reserved: 0x0, length: 24
(1986):     Num of TSs: 1, reserved 0x0, reserved 0x0
(1986):     TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
(1986):     start port: 0, end port: 65535
(1986):     start addr: &lt;STRONG&gt;10.199.199.89&lt;/STRONG&gt;, end addr: &lt;STRONG&gt;10.199.199.89
&lt;/STRONG&gt;(1986):  TSr(1986):   Next payload: NONE, reserved: 0x0, length: 24
(1986):     Num of TSs: 1, reserved 0x0, reserved 0x0
(1986):     TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
(1986):     start port: 0, end port: 65535
(1986):     start addr: remote LAN IP, end addr: remote LAN IP&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;this is VPN proxy selector IP, for which crypto map Seq this ACL belong ?&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044441#M1110064</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T20:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044453#M1110067</link>
      <description>&lt;P&gt;this is the crypto map :&lt;/P&gt;&lt;P&gt;crypto map CSM_INTERNET_AT_map 6 match address CSM_IPSEC_ACL_3&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set pfs group20&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set peer (peer pub ip)&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set ikev2 ipsec-proposal CSM_IP_2&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set security-association lifetime kilobytes unlimited&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set trustpoint VPN&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set df-bit clear-df&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set reverse-route&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 30000 ipsec-isakmp dynamic CSM_INTERNET_AT_map_dynamic&lt;BR /&gt;crypto map CSM_INTERNET_AT_map interface INTERNET_AT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044453#M1110067</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T20:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044459#M1110069</link>
      <description>&lt;P&gt;This crypto map done by fmc not by cli? Am I correct&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CSM_IPSEC_ACL_3 &amp;lt;- this acl permit traffic from which to which LAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044459#M1110069</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T20:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044474#M1110075</link>
      <description>&lt;P&gt;correct , it's permit the mapped add (natted add) of my lan to the remote lan&amp;nbsp;&lt;/P&gt;&lt;P&gt;sho run access-list CSM_IPSEC_ACL_3 access-list CSM_IPSEC_ACL_3 extended permit ip host (the NAT ip of my lan) host (the remote LAN ip)&lt;/P&gt;&lt;P&gt;and i get this log also :&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 1&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 2&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 3&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 4&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto Map: No proxy match on map CSM_INTERNET_AT_map seq 6&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map: Skipping dynamic map CSM_INTERNET_AT_map_dynamic sequence 30000: cannot match peerless map when peer found in previous map entry.IKEv2-PROTO-7: (3989): Failed to verify the proposed policies&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-2: (3989): There was no IPSEC policy found for received TS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 10:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044474#M1110075</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-20T10:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046341#M1110195</link>
      <description>&lt;P&gt;hello all,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please, I'm really struggling with this point. If anyone can help, I would appreciate it!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 08:28:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046341#M1110195</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-21T08:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046381#M1110197</link>
      <description>&lt;P&gt;Sorry for some delay&amp;nbsp; in my reply&lt;BR /&gt;your Side use ACL&amp;nbsp;&lt;BR /&gt;NAT-IP of your LAN -&amp;gt; Remote LAN&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;the other side of VPN must use&amp;nbsp;&lt;BR /&gt;Remote LAN -&amp;gt; NAT-IP of your LAN&lt;BR /&gt;and also they need route for this NAT-IP toward the interface of IPsec&lt;BR /&gt;&lt;BR /&gt;if the other side use real IP then you&amp;nbsp; will face issue in IPSec selector&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;MHM&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 09:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046381#M1110197</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-21T09:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046505#M1110198</link>
      <description>&lt;P&gt;thanks for the replay , i don't have control in the other side but when we switch back to preshared key authentification the VPN works fine .&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 10:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046505#M1110198</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-21T10:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5052401#M1110491</link>
      <description>&lt;P&gt;Hi friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this issue not solved can you share&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show crypto ikev2 sa detail&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you try use cert. For vpn auth&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 22:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5052401#M1110491</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-28T22:16:19Z</dc:date>
    </item>
  </channel>
</rss>

