<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks,  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984437#M144112</link>
    <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm unable to ping the other side, but i believe that's because they have blocked ICMP. Yesterday I was getting &amp;nbsp;a message saying 'All SA proposals found unacceptable' so i thought i was getting the response but there wasn't an agreement on the proposals?&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2016 13:38:55 GMT</pubDate>
    <dc:creator>mawright1</dc:creator>
    <dc:date>2016-12-20T13:38:55Z</dc:date>
    <item>
      <title>Check VPN L2L proposals from Third party firewall</title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984433#M144108</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can someone confirm the process on how to locate the proposals coming into my Firewall from a third party, in the 1st phase of L2L VPN setup as i'm having an issues which the debugging messages show there are no matching proposals on my firewall, i'm aware i can ask the third party what they have configured at their end, but i wanted to see if they was a way i could view whats being recivced and change mine accordingly.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Firewall is a Cisco 5512 running ASA verison 9.1(2).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984433#M144108</guid>
      <dc:creator>mawright1</dc:creator>
      <dc:date>2019-03-12T08:40:53Z</dc:date>
    </item>
    <item>
      <title>Hi there, </title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984434#M144109</link>
      <description>&lt;P&gt;Hi there,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;debug output may not exactly reveal if there is any mismatch in the phase 1 of isakmp parameters. So pretty much at this point it could be anything from pre-shared key (if you are using one), encryption or the hash. It's a good practice to agree on what the security parameters will be for the VPN if you don't have access to the remote VPN device.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you share debug output And also phase 1 configuration ?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 12:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984434#M144109</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-12-20T12:15:35Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply,</title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984435#M144110</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the reply,&lt;/P&gt;
&lt;P&gt;debug message below:&lt;/P&gt;
&lt;P&gt;Dec 20 11:48:54 [IKEv1 DEBUG]IP = 154.59.154.147, IKE MM Initiator FSM error history (struct &amp;amp;0x00007fffaa850bb0) &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;: MM_DONE, EV_ERROR--&amp;gt;MM_WAIT_MSG2, EV_RETRY--&amp;gt;MM_WAIT_MSG2, EV_TIMEOUT--&amp;gt;MM_WAIT_MSG2, NullEvent--&amp;gt;MM_SND_MSG1, EV_SND_MSG--&amp;gt;MM_SND_MSG1, EV_START_TMR--&amp;gt;MM_SND_MSG1, EV_RESEND_MSG--&amp;gt;MM_WAIT_MSG2, EV_RETRY&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 28800&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 5&lt;BR /&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 13:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984435#M144110</guid>
      <dc:creator>mawright1</dc:creator>
      <dc:date>2016-12-20T13:09:35Z</dc:date>
    </item>
    <item>
      <title>This is what's going on:</title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984436#M144111</link>
      <description>&lt;P&gt;This is what's going on:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="color: #339966;"&gt;&lt;!-- style START --&gt;&lt;!-- default style --&gt;&lt;!-- for translations --&gt;&lt;!-- style END --&gt;&lt;!-- script START --&gt;
&lt;SCRIPT src="https://pagead2.googlesyndication.com/pagead/osd.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-content/themes/inove/js/base.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-content/themes/inove/js/menu.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT id="__ie_onload_for_inove" defer="defer"&gt;&lt;/SCRIPT&gt;
&lt;!-- script END --&gt;
&lt;SCRIPT type="text/javascript"&gt;// &amp;lt;![CDATA[
			window._wpemojiSettings = {"baseUrl":"http:\/\/s.w.org\/images\/core\/emoji\/72x72\/","ext":".png","source":{"concatemoji":"http:\/\/mccltd.net\/blog\/wp-includes\/js\/wp-emoji-release.min.js?ver=4.3"}};
			!function(a,b,c){function d(a){var c=b.createElement("canvas"),d=c.getContext&amp;amp;&amp;amp;c.getContext("2d");return d&amp;amp;&amp;amp;d.fillText?(d.textBaseline="top",d.font="600 32px Arial","flag"===a?(d.fillText(String.fromCharCode(55356,56812,55356,56807),0,0),c.toDataURL().length&amp;gt;3e3):(d.fillText(String.fromCharCode(55357,56835),0,0),0!==d.getImageData(16,16,1,1).data[0])):!1}function e(a){var c=b.createElement("script");c.src=a,c.type="text/javascript",b.getElementsByTagName("head")[0].appendChild(c)}var f,g;c.supports={simple:d("simple"),flag:d("flag")},c.DOMReady=!1,c.readyCallback=function(){c.DOMReady=!0},c.supports.simple&amp;amp;&amp;amp;c.supports.flag||(g=function(){c.readyCallback()},b.addEventListener?(b.addEventListener("DOMContentLoaded",g,!1),a.addEventListener("load",g,!1)):(a.attachEvent("onload",g),b.attachEvent("onreadystatechange",function(){"complete"===b.readyState&amp;amp;&amp;amp;c.readyCallback()})),f=c.source||{},f.concatemoji?e(f.concatemoji):f.wpemoji&amp;amp;&amp;amp;f.twemoji&amp;amp;&amp;amp;(e(f.twemoji),e(f.wpemoji)))}(window,document,window._wpemojiSettings);
		
// ]]&amp;gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-includes/js/wp-emoji-release.min.js?ver=4.3"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-includes/js/jquery/jquery.js?ver=1.11.3"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-content/plugins/google-analyticator/external-tracking.min.js?ver=5.3"&gt;&lt;/SCRIPT&gt;
&lt;!-- Google Analytics Tracking by Google Analyticator 5.3: &lt;a href="http://plugins.spiralwebconsulting.com/analyticator.html" TARGET="_blank"&gt;http://plugins.spiralwebconsulting.com/analyticator.html&lt;/a&gt; --&gt;
&lt;SCRIPT type="text/javascript"&gt;// &amp;lt;![CDATA[
		var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
		document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
	
// ]]&amp;gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://www.google-analytics.com/ga.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript"&gt;// &amp;lt;![CDATA[
	try {
		var pageTracker = _gat._getTracker("UA-9587807-3");
		pageTracker._initData();
		pageTracker._trackPageview();
	} catch(err) {}
// ]]&amp;gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript"&gt;// &amp;lt;![CDATA[
				var analyticsFileTypes = [''];
				var analyticsEventTracking = 'enabled';
			
// ]]&amp;gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-content/plugins/slidezoom/highslide/highslide.packed.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript" src="http://mccltd.net/blog/wp-content/plugins/slidezoom/highslide/easing_equations.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript"&gt;// &amp;lt;![CDATA[
hs.graphicsDir= 'http://mccltd.net/blog/wp-content/plugins/slidezoom/highslide/graphics/';
hs.showCredits = false;
hs.wrapperClassName="wide-border";
hs.outlineWhileAnimating = false;
hs.align = 'auto';
hs.easing  = 'easeOutBack';
hs.easingClose  = 'easeInBack';
hs.marginLeft   = 15;
hs.marginTop  = 15;
hs.marginRight  = 15;
hs.marginBottom  = 15;
hs.expandDuration  = 500;
hs.restoreDuration  = 500;
hs.fadeInOut   = 'true';
// ]]&amp;gt;&lt;/SCRIPT&gt;
&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="wrap"&gt;
&lt;DIV id="container"&gt;
&lt;DIV id="content"&gt;
&lt;DIV id="main"&gt;
&lt;DIV id="post-1971" class="post"&gt;
&lt;DIV class="content"&gt;
&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;1) IKE initator sends MM_SND_MSG1 and goes into MM_WAIT_MSG2 state&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #339966;"&gt;2) IKE responder receives MM_SND_MSG1 and sends MM_SND_MSG2 back to the initiator and goes into a MM_WAIT_MSG3 state, expecting MM_SND_MSG3 as the next exchage from the initiator&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #339966;"&gt;3) IKE initiator having not received MM_SND_MSG2 from the responder, resends MM_SND_MSG1, resulting in the “Duplicate first packet detected” being logged on the responder.&lt;/SPAN&gt;&lt;SPAN id="more-1971"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;In the debug (from the initiator) you can see this occuring:Jan 24 09:02:44 [IKEv1 DEBUG]: IP = 123.123.123.123, IKE MM Initiator FSM error history (struct &amp;amp;0xafd4cc28)&amp;nbsp; &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;:&amp;nbsp; MM_DONE, EV_ERROR–&amp;gt;MM_WAIT_MSG2, EV_RETRY–&amp;gt;MM_WAIT_MSG2, EV_TIMEOUT–&amp;gt;MM_WAIT_MSG2, NullEvent–&amp;gt;MM_SND_MSG1, EV_SND_MSG–&amp;gt;MM_SND_MSG1, EV_START_TMR–&amp;gt;MM_SND_MSG1, EV_RESEND_MSG–&amp;gt;MM_WAIT_MSG2, EV_RETRY&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;For some reason you are not getting reply back from the responder which is other end of VPN. It could be an issue with routing on their end. Did you check connectivity between the vpn endpoints? are you able to ping the other side?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 20 Dec 2016 13:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984436#M144111</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-12-20T13:28:03Z</dc:date>
    </item>
    <item>
      <title>Thanks, </title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984437#M144112</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm unable to ping the other side, but i believe that's because they have blocked ICMP. Yesterday I was getting &amp;nbsp;a message saying 'All SA proposals found unacceptable' so i thought i was getting the response but there wasn't an agreement on the proposals?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 13:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984437#M144112</guid>
      <dc:creator>mawright1</dc:creator>
      <dc:date>2016-12-20T13:38:55Z</dc:date>
    </item>
    <item>
      <title>I understand, but based on</title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984438#M144113</link>
      <description>&lt;P&gt;I understand, but based on the debug output you posted your firewall is complaining that it's not getting reply back from it's peer to bring up phase 1 of isakmp. You will need to work with the team that's handling the remote VPN device and see if they are receiving &lt;SPAN&gt;MM_SND_MSG1 sent by your firewall. That way we will know that you have connectivity to the remote site and then work on why return traffic is not making it back.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 14:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984438#M144113</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-12-20T14:01:39Z</dc:date>
    </item>
    <item>
      <title>Hi ,</title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984439#M144114</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;when Message 3 &amp;nbsp;sending to res ponders &amp;amp; not accepting .&lt;/P&gt;
&lt;P&gt;Means that Initiator sending DH group is not accepting Res ponder .&lt;/P&gt;
&lt;P&gt;can you share the both running configuration ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Mani&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 14:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984439#M144114</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2016-12-20T14:54:47Z</dc:date>
    </item>
    <item>
      <title>The third party changed their</title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984440#M144115</link>
      <description>&lt;P&gt;The third party changed their end and we established a VPN connection!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your help!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 15:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984440#M144115</guid>
      <dc:creator>mawright1</dc:creator>
      <dc:date>2016-12-20T15:38:35Z</dc:date>
    </item>
    <item>
      <title>I understand, but based on</title>
      <link>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984441#M144116</link>
      <description>&lt;P&gt;I understand, but based on the debug output you posted your firewall is complaining that it's not getting reply back from it's peer to bring up phase 1 of isakmp. You will need to work with the team that's handling the remote VPN device and see if they are receiving MM_SND_MSG1 sent by your firewall. That way we will know that you have connectivity to the remote site and then work on why return traffic is not making it back.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2017 12:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/check-vpn-l2l-proposals-from-third-party-firewall/m-p/2984441#M144116</guid>
      <dc:creator>Farhan Mohamed</dc:creator>
      <dc:date>2017-01-12T12:47:09Z</dc:date>
    </item>
  </channel>
</rss>

