<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD IKE/IPSec VPN site to site certificate authentication  error in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5053338#M1110536</link>
    <description>&lt;P&gt;&lt;SPAN&gt;It appears you've followed the recommended steps and explored various options to resolve the issue with VPN configuration. If the CA authority cannot alter the EKU, consider collaborating with Cisco support to explore alternative solutions or workarounds for bypassing the EKU check. For additional assistance, you may also consider consulting reputable&lt;A href="https://attestationservicesdubai.com/" target="_self"&gt; attestation services in Dubai for expert guidance&lt;/A&gt; on navigating complex certification issues.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 30 Mar 2024 11:24:07 GMT</pubDate>
    <dc:creator>Shanza</dc:creator>
    <dc:date>2024-03-30T11:24:07Z</dc:date>
    <item>
      <title>FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043467#M1110013</link>
      <description>&lt;P&gt;hello all ,&lt;/P&gt;&lt;P&gt;recently i tried to configure VPN site to site with certificate authentication type, i got the certificate signed by a third party autority , and when i did the debugs i got this log :&lt;/P&gt;&lt;P&gt;CRYPTO_PKI: bitValue of KEY_USAGE = a0PKI[7]: CRYPTO_PKI:check_key_usage: Checking KU for case VPN peer certs.&lt;/P&gt;&lt;P&gt;PKI[7]: CRYPTO_PKI:check_key_usage: KU bit digitalSignature is ON.&lt;/P&gt;&lt;P&gt;PKI[7]: ExtendedKeyUsage OID = serverAuth NOT acceptable for usage type IPSEC VPN Peer&lt;/P&gt;&lt;P&gt;PKI[4]: check_key_usage: No acceptable ExtendedKeyUsage OIDs found&lt;/P&gt;&lt;P&gt;PKI[7]: check_key_usage: IGNORING IPSec Key Usage check failure&lt;/P&gt;&lt;P&gt;PKI[12]: pki_ossl_do_callback, pki_ossl_validate.c:164&lt;/P&gt;&lt;P&gt;PKI[9]: Async unlocked for session 0x9a679795&lt;/P&gt;&lt;P&gt;PKI[12]: CERT_VerifyData, vpn3k_cert_api.c:603&lt;/P&gt;&lt;P&gt;PKI[9]: CERT API thread sleeps!&lt;/P&gt;&lt;P&gt;i saw some documentation that recommend to apply the&amp;nbsp;ignore-ipsec-keyusage&amp;nbsp; , even the support suggest to apply this command on the trustpoint and that what i did :&lt;/P&gt;&lt;P&gt;sh run cry ca trustpoint VPN&lt;/P&gt;&lt;P&gt;crypto ca trustpoint VPN&lt;/P&gt;&lt;P&gt;keypair VPN_BA_AGB&lt;/P&gt;&lt;P&gt;ignore-ipsec-keyusage &amp;lt;---&lt;/P&gt;&lt;P&gt;crl configure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i also checked the option : ignore ipsec key usage on the enroulement in key tab ,&lt;/P&gt;&lt;P&gt;and this is an other recommendation of support :&lt;/P&gt;&lt;P&gt;The recommendation is to get the right EKU/OID on the certificate in order for the firewall to be able to use it for IPSec VPN certificate authentication&lt;/P&gt;&lt;P&gt;but the CA authority confirm to me that they do that with other vendors and it works fine and they can not change th EKU cause this is not allowed ,&lt;/P&gt;&lt;P&gt;is there any way to force FTD to escape the EKU check ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 08:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043467#M1110013</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T08:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043704#M1110015</link>
      <description>&lt;P&gt;you use FMC to mgmt FTD?\&lt;/P&gt;
&lt;P&gt;under FMC cert. you can select ignore the keyusage&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (200).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213138i50E2CDA6F0BA903B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (200).png" alt="Screenshot (200).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 11:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043704#M1110015</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T11:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043800#M1110019</link>
      <description>&lt;P&gt;thanks for the replay ,&lt;/P&gt;&lt;P&gt;i alredy did select the ignore the key usage :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="soufiansaheb_0-1710848806476.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/213140i53C22E63E0C9FD7F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="soufiansaheb_0-1710848806476.png" alt="soufiansaheb_0-1710848806476.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and even i used Flexconfig to ignore the ipsec keyusage as follow :&lt;/P&gt;&lt;P&gt;crypto ca trustpoint VPN&lt;BR /&gt;keypair VPN_BA_AGB&lt;BR /&gt;ignore-ipsec-keyusage&lt;BR /&gt;crl configure&lt;/P&gt;&lt;P&gt;i hope there is another way to ignore this check&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 11:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5043800#M1110019</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T11:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044054#M1110024</link>
      <description>&lt;PRE id="wp2485454775__ID-3899-00000df7" class="pre codeblock"&gt;&lt;CODE&gt;&amp;gt; &lt;KBD class="userinput"&gt;&lt;STRONG class="ph userinput"&gt;show crypto ca trustpoints&lt;/STRONG&gt;&lt;/KBD&gt;
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;can you check if command we config via flexconfig is successfully add to FTD&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 14:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044054#M1110024</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T14:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044111#M1110027</link>
      <description>&lt;P&gt;thanks for the replay :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sho run crypto ca trustpoint VPN&lt;/STRONG&gt;&lt;BR /&gt;crypto ca trustpoint VPN&lt;BR /&gt;keypair VPN_BA_AGB&lt;BR /&gt;ignore-ipsec-keyusage&lt;BR /&gt;crl configure&lt;/P&gt;&lt;P&gt;sho crypto ca trustpoints VPN&lt;/P&gt;&lt;P&gt;Trustpoint VPN:&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=xxxxxxxxxxxxxx&lt;BR /&gt;o=xxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;c=XX&lt;BR /&gt;Serial Number: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;Certificate configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 15:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044111#M1110027</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T15:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044139#M1110028</link>
      <description>&lt;P&gt;&lt;A href="https://bst.cisco.com/quickview/bug/CSCvp56951" target="_blank"&gt;Cisco Bug: CSCvp56951 - FDM/FTDvirtual unable to support/deploy "ignore-ipsec-keyusage" flexconfig object&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;check this bug&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 15:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044139#M1110028</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T15:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044163#M1110029</link>
      <description>&lt;P&gt;This is the only and absolutely correct way to ignore EKU check on received certificates. And from the debug it is evident that the command "ignore-ipsec-keyusage" works as expected (below in bold):&lt;/P&gt;&lt;PRE&gt;PKI[7]: CRYPTO_PKI:check_key_usage: KU bit digitalSignature is ON.&lt;BR /&gt;PKI[7]: ExtendedKeyUsage OID = serverAuth NOT acceptable for usage type IPSEC VPN Peer&lt;BR /&gt;PKI[4]: check_key_usage: No acceptable ExtendedKeyUsage OIDs found&lt;BR /&gt;&lt;STRONG&gt;PKI[7]: check_key_usage: IGNORING IPSec Key Usage check failure&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;Alternatively you can use CA which can generate certs with proper KU and EKU set. So far as I remember, the KU should contain bit Digital Signature and EKU should contain id-kp-ipsecEndSystem (1.3.6.1.5.5.7.3.5) or id-kp-ipsecTunnel (1.3.6.1.5.5.7.3.6) or id-kp-clientAuth (1.3.6.1.5.5.7.3.2) or id-kp-ipsecUser (1.3.6.1.5.5.7.3.7). The serverAuth EKU is good when ASA/FTD responds to client end systems. For L2L VPN this EKU indeed looks a bit strange, that is why it is not accepted by default for L2L.&lt;/P&gt;&lt;P&gt;If your tunnel is not established, it is due to something else and not due to wrong EKU.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 15:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044163#M1110029</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-19T15:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044365#M1110038</link>
      <description>&lt;P&gt;Indeed it can cert. Is accept&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IKEv2-PROTO-4: (2793): Verification of peer's authenctication data &lt;STRONG&gt;PASSED&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check the acl of vpn in both side' the acl dont match any crypto map seq&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 18:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044365#M1110038</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T18:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044385#M1110042</link>
      <description>&lt;P&gt;what i don't understand is when i change to pre shared key the VPN works fine&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 19:12:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044385#M1110042</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T19:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044394#M1110044</link>
      <description>&lt;P&gt;this is the the out put of debug crypto ca 14 :&lt;/P&gt;&lt;P&gt;CRYPTO_PKI: bitValue of KEY_USAGE = a0PKI[7]: CRYPTO_PKI:check_key_usage: Checking KU for case VPN peer certs.&lt;BR /&gt;PKI[7]: CRYPTO_PKI:check_key_usage: KU bit digitalSignature is ON.&lt;BR /&gt;PKI[7]: ExtendedKeyUsage OID = serverAuth NOT acceptable for usage type IPSEC VPN Peer&lt;BR /&gt;PKI[4]: check_key_usage: No acceptable ExtendedKeyUsage OIDs found&lt;BR /&gt;PKI[7]: check_key_usage: IGNORING IPSec Key Usage check failure&lt;BR /&gt;PKI[12]: pki_ossl_do_callback, pki_ossl_validate.c:164&lt;BR /&gt;PKI[9]: Async unlocked for session 0x3e3190cd&lt;BR /&gt;PKI[12]: CERT_VerifyData, vpn3k_cert_api.c:603&lt;BR /&gt;PKI[9]: CERT API thread sleeps!&lt;BR /&gt;PKI[13]: CERT_GetPeerCertValidityEndTime, vpn3k_cert_api.c:3489&lt;BR /&gt;PKI[12]: asn1_to_unix_time, crypto_pki.c:1720&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[13]: CERT_SignData, vpn3k_cert_api.c:361&lt;BR /&gt;PKI[14]: map_status, vpn3k_cert_api.c:2512&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[13]: CERT_Close, vpn3k_cert_api.c:291&lt;BR /&gt;PKI[8]: Close session 0x47861677 synchronously&lt;BR /&gt;PKI[13]: pki_ossl_free_valctx, pki_ossl_validate.c:251&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;BR /&gt;PKI[14]: CERT_GetPrintableX500DN, vpn3k_cert_api.c:3267&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and this for debug crypto ikev2 protocol 255 in attachement&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 19:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044394#M1110044</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T19:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044402#M1110047</link>
      <description>&lt;P&gt;Peer doesn't respond to CREATE_CHILD_SA request. You need to collect logs/debugs from both sides at once, otherwise it's difficult to say something, because debugs depend on initiator/responder roles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 19:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044402#M1110047</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-03-19T19:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044437#M1110063</link>
      <description>&lt;P&gt;thanks for the replay ,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;unfortunatley i don't have control on the peer side , i'll ask them to give me some logs if it is possible&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044437#M1110063</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T20:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044441#M1110064</link>
      <description>&lt;PRE class="bp-text bp-text-plain hljs bp-is-scrollable" tabindex="0"&gt;&lt;CODE class="bp-text-code txt"&gt;(1986):  TSi(1986):   Next payload: TSr, reserved: 0x0, length: 24
(1986):     Num of TSs: 1, reserved 0x0, reserved 0x0
(1986):     TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
(1986):     start port: 0, end port: 65535
(1986):     start addr: &lt;STRONG&gt;10.199.199.89&lt;/STRONG&gt;, end addr: &lt;STRONG&gt;10.199.199.89
&lt;/STRONG&gt;(1986):  TSr(1986):   Next payload: NONE, reserved: 0x0, length: 24
(1986):     Num of TSs: 1, reserved 0x0, reserved 0x0
(1986):     TS type: TS_IPV4_ADDR_RANGE, proto id: 0, length: 16
(1986):     start port: 0, end port: 65535
(1986):     start addr: remote LAN IP, end addr: remote LAN IP&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;this is VPN proxy selector IP, for which crypto map Seq this ACL belong ?&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044441#M1110064</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T20:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044453#M1110067</link>
      <description>&lt;P&gt;this is the crypto map :&lt;/P&gt;&lt;P&gt;crypto map CSM_INTERNET_AT_map 6 match address CSM_IPSEC_ACL_3&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set pfs group20&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set peer (peer pub ip)&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set ikev2 ipsec-proposal CSM_IP_2&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set security-association lifetime kilobytes unlimited&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set trustpoint VPN&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set df-bit clear-df&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 6 set reverse-route&lt;BR /&gt;crypto map CSM_INTERNET_AT_map 30000 ipsec-isakmp dynamic CSM_INTERNET_AT_map_dynamic&lt;BR /&gt;crypto map CSM_INTERNET_AT_map interface INTERNET_AT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044453#M1110067</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-19T20:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044459#M1110069</link>
      <description>&lt;P&gt;This crypto map done by fmc not by cli? Am I correct&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CSM_IPSEC_ACL_3 &amp;lt;- this acl permit traffic from which to which LAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 20:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044459#M1110069</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-19T20:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044474#M1110075</link>
      <description>&lt;P&gt;correct , it's permit the mapped add (natted add) of my lan to the remote lan&amp;nbsp;&lt;/P&gt;&lt;P&gt;sho run access-list CSM_IPSEC_ACL_3 access-list CSM_IPSEC_ACL_3 extended permit ip host (the NAT ip of my lan) host (the remote LAN ip)&lt;/P&gt;&lt;P&gt;and i get this log also :&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 1&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 2&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 3&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map CSM_INTERNET_AT_map seq 4&amp;nbsp; peer doesn't match map entry&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto Map: No proxy match on map CSM_INTERNET_AT_map seq 6&lt;/P&gt;&lt;P&gt;IKEv2-PLAT-4: (3989): Crypto map: Skipping dynamic map CSM_INTERNET_AT_map_dynamic sequence 30000: cannot match peerless map when peer found in previous map entry.IKEv2-PROTO-7: (3989): Failed to verify the proposed policies&lt;/P&gt;&lt;P&gt;IKEv2-PROTO-2: (3989): There was no IPSEC policy found for received TS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 10:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5044474#M1110075</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-20T10:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046341#M1110195</link>
      <description>&lt;P&gt;hello all,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please, I'm really struggling with this point. If anyone can help, I would appreciate it!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 08:28:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046341#M1110195</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-21T08:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046381#M1110197</link>
      <description>&lt;P&gt;Sorry for some delay&amp;nbsp; in my reply&lt;BR /&gt;your Side use ACL&amp;nbsp;&lt;BR /&gt;NAT-IP of your LAN -&amp;gt; Remote LAN&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;the other side of VPN must use&amp;nbsp;&lt;BR /&gt;Remote LAN -&amp;gt; NAT-IP of your LAN&lt;BR /&gt;and also they need route for this NAT-IP toward the interface of IPsec&lt;BR /&gt;&lt;BR /&gt;if the other side use real IP then you&amp;nbsp; will face issue in IPSec selector&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;MHM&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 09:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046381#M1110197</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-21T09:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046505#M1110198</link>
      <description>&lt;P&gt;thanks for the replay , i don't have control in the other side but when we switch back to preshared key authentification the VPN works fine .&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 10:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5046505#M1110198</guid>
      <dc:creator>soufiansaheb</dc:creator>
      <dc:date>2024-03-21T10:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IKE/IPSec VPN site to site certificate authentication  error</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5052401#M1110491</link>
      <description>&lt;P&gt;Hi friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this issue not solved can you share&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show crypto ikev2 sa detail&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you try use cert. For vpn auth&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 22:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ike-ipsec-vpn-site-to-site-certificate-authentication-error/m-p/5052401#M1110491</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-28T22:16:19Z</dc:date>
    </item>
  </channel>
</rss>

