<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Carlguer, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899210#M158184</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Hi Carlguer,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Thanks for the&amp;nbsp;reply.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;As I mentioned, I am new to VPNs, especially on Cisco products. Neither side is using PFS as far as I can tell.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Could you let me know how I can chang the DH group in phase 1 from 2 to 5?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Am I right in thinking the ESP-3DES-MD5 being sent from my Smoothwall applies to phase 2?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;If so, I can see ESP-3DES-MD5 listed on the ASA transform sets.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;My Transform Sets and other settings are:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;# sh run crypto&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map Outside_map 1 match address Outside_cryptomap_1&lt;BR /&gt;crypto map Outside_map 1 set peer [b][ SMOOTHWALL RED INTERFACE IP ][/b]&lt;BR /&gt;crypto map Outside_map 1 set ikev1 transform-set ESP-AES-256-SHA ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map Outside_map 1 set ikev2 ipsec-proposal AES256 DES 3DES AES AES192&lt;BR /&gt;crypto map Outside_map interface Outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca 6ecc7aa5a7032009b8cebcf4e9&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597&lt;BR /&gt;&amp;nbsp; &amp;nbsp; a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63cd1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 02030100 01a38201 df308201&lt;BR /&gt;&amp;nbsp; &amp;nbsp; db303406 082b0601 05050701 01042830 26302406 082b0601 05050730 01861868&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1d130101&lt;BR /&gt;&amp;nbsp; &amp;nbsp; ff040830 060101ff 02010030 70060355 1d200469 30673065 060b6086 480186f8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 45010717 03305630 2806082b 06010505 07020116 1c687474 70733a2f 2f777777&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2e766572 69736967 6e2e636f 6d2f6370 73302a06 082b0601 05050702 02301e1a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1c687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 03551d1f 042d302b 3029a027 a0258623 68747470 3a2f2f63 726c2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 02010630 6d06082b 06010505 07010c04 61305fa1 5da05b30 59305730 55160969&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6d616765 2f676966 3021301f 30070605 2b0e0302 1a04148f e5d31a86 ac8d8e6b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1b311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301d0603&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 551d0e04 1604140d 445c1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2a864886 f70d0101 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b2227055 d9203340 3307c265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6decd018 7d494aca 99c71928 a2bed877 24f78526 866d8705 404167d1 273aeddc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6c2527b9 deb78458 c61f381e a4c4cb66&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable Outside&lt;BR /&gt;crypto ikev1 enable Outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where can I check the 'interesting traffic matching' on the ASA?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;/P&gt;
&lt;P&gt;Oliver.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Mar 2016 09:10:25 GMT</pubDate>
    <dc:creator>opgailey1</dc:creator>
    <dc:date>2016-03-24T09:10:25Z</dc:date>
    <item>
      <title>Site-To-Site VPN - Phase 2 Mismatch / All IPSec SA proposals found unacceptable!</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899208#M158182</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Before I start, I should mention that I am new to Cisco products and VPNs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm struggling to get a site to site VPN between a Smoothwall Express 3.0 and Cisco ASA 5505 working.&lt;/P&gt;
&lt;P&gt;I've followed the wizard on the Cisco ASDM and it seems to be working up to phase 1. It appears to fail at phase 2 though.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am getting the following messages on the ASDM screen.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="http://i.imgur.com/JIvIeZR.png" alt="" width="803" height="268" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The settings on the Smoothwall end are:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;conn [ NAME ]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;ike=aes256-sha1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;esp=3des-md5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;authby=secret&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;keyingtries=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;left=[ REMOTE PUBLIC IP ]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;leftsubnet=192.168.1.0/24&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;leftnexthop=%defaultroute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;right=[ LOCAL PUBLIC IP ]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;rightsubnet=192.168.100.0/23&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;rightnexthop=%defaultroute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;compress=no&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;auto=start&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm trying to create a link between the following LANs:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;192.168.1.0/24&lt;/P&gt;
&lt;P&gt;192.168.100.0/23&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Could someone enlighten me to exactly what phase 2 is and how it might be mismatched?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Happy to provide more information if needed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Oliver.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899208#M158182</guid>
      <dc:creator>opgailey1</dc:creator>
      <dc:date>2019-03-12T07:32:16Z</dc:date>
    </item>
    <item>
      <title>Hello opgailey1,</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899209#M158183</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/opgailey1" title="View user profile." class="username" lang="" about="/users/opgailey1" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;opgailey1&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It looks like you have a mismatch in phase 2, but also a mismatch in phase 1.&lt;/P&gt;
&lt;P&gt;The logs provided point to be a mismatch in the DH group in the phase 1, it's receiving group 5 and you have configured group 2.&lt;/P&gt;
&lt;P&gt;In phase 2 I would check the transform set and the interesting traffic matching, also I would l look for if any of the sides is using pfs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;- Javier -&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2016 20:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899209#M158183</guid>
      <dc:creator>carlguer</dc:creator>
      <dc:date>2016-03-23T20:40:30Z</dc:date>
    </item>
    <item>
      <title>Hi Carlguer,</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899210#M158184</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Hi Carlguer,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Thanks for the&amp;nbsp;reply.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;As I mentioned, I am new to VPNs, especially on Cisco products. Neither side is using PFS as far as I can tell.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Could you let me know how I can chang the DH group in phase 1 from 2 to 5?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Am I right in thinking the ESP-3DES-MD5 being sent from my Smoothwall applies to phase 2?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;If so, I can see ESP-3DES-MD5 listed on the ASA transform sets.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;My Transform Sets and other settings are:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;# sh run crypto&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map Outside_map 1 match address Outside_cryptomap_1&lt;BR /&gt;crypto map Outside_map 1 set peer [b][ SMOOTHWALL RED INTERFACE IP ][/b]&lt;BR /&gt;crypto map Outside_map 1 set ikev1 transform-set ESP-AES-256-SHA ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map Outside_map 1 set ikev2 ipsec-proposal AES256 DES 3DES AES AES192&lt;BR /&gt;crypto map Outside_map interface Outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca 6ecc7aa5a7032009b8cebcf4e9&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597&lt;BR /&gt;&amp;nbsp; &amp;nbsp; a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63cd1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 02030100 01a38201 df308201&lt;BR /&gt;&amp;nbsp; &amp;nbsp; db303406 082b0601 05050701 01042830 26302406 082b0601 05050730 01861868&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1d130101&lt;BR /&gt;&amp;nbsp; &amp;nbsp; ff040830 060101ff 02010030 70060355 1d200469 30673065 060b6086 480186f8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 45010717 03305630 2806082b 06010505 07020116 1c687474 70733a2f 2f777777&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2e766572 69736967 6e2e636f 6d2f6370 73302a06 082b0601 05050702 02301e1a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1c687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 03551d1f 042d302b 3029a027 a0258623 68747470 3a2f2f63 726c2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 02010630 6d06082b 06010505 07010c04 61305fa1 5da05b30 59305730 55160969&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6d616765 2f676966 3021301f 30070605 2b0e0302 1a04148f e5d31a86 ac8d8e6b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1b311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301d0603&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 551d0e04 1604140d 445c1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2a864886 f70d0101 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b2227055 d9203340 3307c265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6decd018 7d494aca 99c71928 a2bed877 24f78526 866d8705 404167d1 273aeddc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6c2527b9 deb78458 c61f381e a4c4cb66&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable Outside&lt;BR /&gt;crypto ikev1 enable Outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where can I check the 'interesting traffic matching' on the ASA?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;/P&gt;
&lt;P&gt;Oliver.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 09:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899210#M158184</guid>
      <dc:creator>opgailey1</dc:creator>
      <dc:date>2016-03-24T09:10:25Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899211#M158185</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can check it under the following config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;crypto map Outside_map 1 match address Outside_cryptomap_1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto map Outside_map 1 set peer [b][ SMOOTHWALL RED INTERFACE IP ][/b]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Check the output of the show access-list&amp;nbsp;&lt;SPAN&gt;Outside_cryptomap_1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and match the interesting traffic with the remote peer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The ACL should be mirror replica of the other end.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 11:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-phase-2-mismatch-all-ipsec-sa-proposals-found/m-p/2899211#M158185</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-24T11:21:45Z</dc:date>
    </item>
  </channel>
</rss>

