<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005974#M23367</link>
    <description>&lt;P&gt;changed the pre-shared key on both ends, cleared crypto ikev2 stats and run packet tracer command again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still the same result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;logs on ASA:&lt;/P&gt;&lt;P&gt;&amp;lt;165&amp;gt;:Jan 03 14:34:02 EAT: %ASA-vpn-5-752003: Tunnel Manager dispatching a KEY_ACQUIRE message to IKEv2. Map Tag = MYMAP. Map Sequence Number = 23.&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 03 14:34:02 EAT: %ASA-vpn-4-752011: IKEv1 Doesn't have a transform set specified&lt;BR /&gt;&amp;lt;165&amp;gt;:Jan 03 14:34:02 EAT: %ASA-vpn-5-750001: Local:172.31.42.1:500 Remote:154.73.170.138:500 Username:Unknown IKEv2 Received request to establish an IPsec tunnel; local traffic selector = Address Range: 172.31.28.5-172.31.28.5 Protocol: 0 Port Range: 0-65535 ; remote traffic selector = Address Range: 192.168.112.212-192.168.112.212 Protocol: 0 Port Range: 0-65535&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 03 14:34:03 EAT: %ASA-vpn-4-750003: Local:172.31.42.1:4500 Remote:154.73.170.138:4500 Username:154.73.170.138 IKEv2 Negotiation aborted due to ERROR: Auth exchange failed&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 03 14:34:03 EAT: %ASA-vpn-4-752012: IKEv2 was unsuccessful at setting up a tunnel. Map Tag = MYMAP. Map Sequence Number = 23.&lt;BR /&gt;&amp;lt;163&amp;gt;:Jan 03 14:34:03 EAT: %ASA-vpn-3-752015: Tunnel Manager has failed to establish an L2L SA. All configured IKE versions failed to establish the tunnel. Map Tag= MYMAP. Map Sequence Number = 23.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# sh cry ikev2 stats&lt;/P&gt;&lt;P&gt;Global IKEv2 Statistics&lt;BR /&gt;Active Tunnels: - 5&lt;BR /&gt;Previous Tunnels: 2&lt;BR /&gt;In Octets: 3624&lt;BR /&gt;In Packets: 12&lt;BR /&gt;In Drop Packets: 0&lt;BR /&gt;In Drop Fragments: 0&lt;BR /&gt;In Notifys: 28&lt;BR /&gt;In P2 Exchange: 2&lt;BR /&gt;In P2 Exchange Invalids: 0&lt;BR /&gt;In P2 Exchange Rejects: 0&lt;BR /&gt;In IPSEC Delete: 0&lt;BR /&gt;In IKE Delete: 0&lt;BR /&gt;Out Octets: 5566&lt;BR /&gt;Out Packets: 24&lt;BR /&gt;Out Drop Packets: 0&lt;BR /&gt;Out Drop Fragments: 0&lt;BR /&gt;Out Notifys: 28&lt;BR /&gt;Out P2 Exchange: 14&lt;BR /&gt;Out P2 Exchange Invalids: 0&lt;BR /&gt;Out P2 Exchange Rejects: 2&lt;BR /&gt;Out IPSEC Delete: 0&lt;BR /&gt;Out IKE Delete: 0&lt;BR /&gt;SAs Locally Initiated: 2&lt;BR /&gt;SAs Locally Initiated Failed: 2&lt;BR /&gt;SAs Remotely Initiated: 2&lt;BR /&gt;SAs Remotely Initiated Failed: 0&lt;BR /&gt;System Capacity Failures: 0&lt;BR /&gt;Authentication Failures: 2&lt;BR /&gt;Decrypt Failures: 0&lt;BR /&gt;Hash Failures: 0&lt;BR /&gt;Invalid SPI: 0&lt;BR /&gt;In Configs: 0&lt;BR /&gt;Out Configs: 0&lt;BR /&gt;In Configs Rejects: 0&lt;BR /&gt;Out Configs Rejects: 0&lt;BR /&gt;Previous Tunnels: 2&lt;BR /&gt;Previous Tunnels Wraps: 0&lt;BR /&gt;In DPD Messages: 0&lt;BR /&gt;Out DPD Messages: 2&lt;BR /&gt;Out NAT Keepalives: 2&lt;BR /&gt;IKE Rekey Locally Initiated: 0&lt;BR /&gt;IKE Rekey Remotely Initiated: 0&lt;BR /&gt;Locally Initiated IKE Rekey Rejected: 0&lt;BR /&gt;Remotely Initiated IKE Rekey Rejected: 0&lt;BR /&gt;CHILD Rekey Locally Initiated: 0&lt;BR /&gt;CHILD Rekey Remotely Initiated: 0&lt;/P&gt;&lt;P&gt;IKEV2 Call Admission Statistics&lt;BR /&gt;Max Active SAs: No Limit&lt;BR /&gt;Max In-Negotiation SAs: 1500&lt;BR /&gt;Cookie Challenge Threshold: Never&lt;BR /&gt;Active SAs: 1&lt;BR /&gt;In-Negotiation SAs: 0&lt;BR /&gt;Incoming Requests: 3&lt;BR /&gt;Incoming Requests Accepted: 3&lt;BR /&gt;Incoming Requests Rejected: 0&lt;BR /&gt;Outgoing Requests: 2&lt;BR /&gt;Outgoing Requests Accepted: 2&lt;BR /&gt;Outgoing Requests Rejected: 0&lt;BR /&gt;Rejected Requests: 0&lt;BR /&gt;Rejected Over Max SA limit: 0&lt;BR /&gt;Rejected Low Resources: 0&lt;BR /&gt;Rejected Reboot In Progress: 0&lt;BR /&gt;Cookie Challenges: 0&lt;BR /&gt;Cookie Challenges Passed: 0&lt;BR /&gt;Cookie Challenges Failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug output attached&lt;/P&gt;</description>
    <pubDate>Fri, 03 Jan 2020 11:48:39 GMT</pubDate>
    <dc:creator>S.U.H.E.L</dc:creator>
    <dc:date>2020-01-03T11:48:39Z</dc:date>
    <item>
      <title>Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005523#M23334</link>
      <description>&lt;P&gt;Trying to establish a VPN connection between ASAv30 and Sophos XG210&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPs took for example:&lt;/P&gt;&lt;P&gt;ASA public IP: 1.1.1.1&lt;/P&gt;&lt;P&gt;ASA local network: 10.1.1.0/24&lt;/P&gt;&lt;P&gt;Sophos public IP: 2.2.2.2&lt;/P&gt;&lt;P&gt;Sophos Local network: 10.2.2.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attached are parameters defined at Sophos end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the config on ASAv30:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static&amp;nbsp;Obj_10.1.1.0&amp;nbsp;Obj_10.1.1.0 destination static&amp;nbsp;Obj_10.2.2.0&amp;nbsp;Obj_10.2.2.0 no-proxy-arp&lt;/P&gt;&lt;P&gt;access-list VPN_ACL extended permit ip object Obj_10.1.1.0 object Obj_10.2.2.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;BR /&gt;enc aes-256&lt;BR /&gt;int sha256&lt;BR /&gt;group 5&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 5400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal VPN-PROPOSAL&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_2.2.2.2 internal&lt;BR /&gt;group-policy GroupPolicy_2.2.2.2 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group 2.2.2.2 type ipsec-l2l&lt;BR /&gt;tunnel-group 2.2.2.2 ipsec-attributes&lt;BR /&gt;ikev2 remote-authentication pre-shared-key abc123&lt;BR /&gt;ikev2 local-authentication pre-shared-key abc123&lt;BR /&gt;tunnel-group 2.2.2.2 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_2.2.2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map MYMAP 10 match address VPN_ACL&lt;BR /&gt;crypto map MYMAP 10 set peer 2.2.2.2&lt;BR /&gt;crypto map MYMAP 10 set ikev2 ipsec-proposal VPN-PROPOSAL&lt;/P&gt;&lt;P&gt;crypto map MYMAP interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at the config on Sophos end, is there anything missing on ASA?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 12:59:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005523#M23334</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T12:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005526#M23336</link>
      <description>Hi,&lt;BR /&gt;Do you have "crypto ikev2 enable OUTSIDE" configured on the ASA?</description>
      <pubDate>Thu, 02 Jan 2020 13:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005526#M23336</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T13:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005529#M23338</link>
      <description>Yes, it is.</description>
      <pubDate>Thu, 02 Jan 2020 13:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005529#M23338</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T13:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005539#M23340</link>
      <description>The Sophos Phase 1 DH group says "6 selected" what was selected? The ASA is configured with DH group 5. Ensure they are exactly the same.&lt;BR /&gt;&lt;BR /&gt;The Sophos Phase 2 settings confirms the PFS group (DH group) is Same as Phase 1 - The ASA does not have PFS group defined. Remove PFS from Sophos or add PFS to ASA, ensure they are identical.&lt;BR /&gt;&lt;BR /&gt;Make the changes and try establishing a VPN, if an issue please provide the output from debugs, also run packet-tracer from the CLI and provide the output for review.</description>
      <pubDate>Thu, 02 Jan 2020 13:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005539#M23340</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T13:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005543#M23342</link>
      <description>initially, 6 groups were selected but was later changed to group-5 from sophos end as well.&lt;BR /&gt;&lt;BR /&gt;how do we define pfs group on ASA? can you share the command specific to this scenario where DH group is 5?&lt;BR /&gt;&lt;BR /&gt;Ran the following packet tracer command:&lt;BR /&gt;packet-tracer input inside tcp 10.1.1.1 55555 10.2.2.1 443 detailed.&lt;BR /&gt;&lt;BR /&gt;the output shows dropped at VPN phase type : Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;I understand traffic is dropped initially when a new VPN connection is set up but I've been trying this for a while now and it still drops at the same phase.</description>
      <pubDate>Thu, 02 Jan 2020 13:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005543#M23342</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T13:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005544#M23343</link>
      <description>To enable PFS on the ASA use "crypto map MYMAP 10 set pfs group5"&lt;BR /&gt;&lt;BR /&gt;Turn on IKEv2 debugs and try again, upload the output if it still does not work.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 02 Jan 2020 13:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005544#M23343</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T13:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005552#M23345</link>
      <description>&lt;P&gt;configured "crypto map MYMAP 10 set pfs group5" as suggested. Still packet-tracer output drops at VPN phase with the same reason.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following error is observed on SOPHOS end:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2020-01-02 18:41:25 14[DMN] [GARNER-LOGGING] (child_alert) ALERT: received IKE message with invalid SPI (E89B7FE6) from other side.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please share debug commands which can be used.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 13:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005552#M23345</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T13:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005555#M23347</link>
      <description>Use the commands "debug crypto ikev2 platform 128" and "debug crypto ikev2 protocol 128"</description>
      <pubDate>Thu, 02 Jan 2020 13:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005555#M23347</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T13:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005558#M23349</link>
      <description>Tried to run debug but got the following notification:&lt;BR /&gt;&lt;BR /&gt;ASA# debug crypto ikev2 protocol 128&lt;BR /&gt;INFO: 'logging debug-trace' is enabled. All debug messages are currently being redirected to syslog:711001 and will not appear in any monitor session&lt;BR /&gt;ASA# debug crypto ikev2 platform 128&lt;BR /&gt;INFO: 'logging debug-trace' is enabled. All debug messages are currently being redirected to syslog:711001 and will not appear in any monitor session&lt;BR /&gt;&lt;BR /&gt;How do I enable debug logs to appear in "show logging" output&lt;BR /&gt;&lt;BR /&gt;And what commands do I run after enabling debug?</description>
      <pubDate>Thu, 02 Jan 2020 13:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005558#M23349</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T13:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005562#M23351</link>
      <description>If the logs are being sent to your syslog server you could gather them from there and forward. Or alternatively temporarily disable the debug-trace command with "no logging debug-trace", enable the debugs and the logs should appear on the console and appear under "show logging".&lt;BR /&gt;&lt;BR /&gt;The ASA will only attempt to establish a VPN and therefore output the debug information when you attempt to send traffic across the VPN tunnel. Generate traffic PC behind the ASA.</description>
      <pubDate>Thu, 02 Jan 2020 13:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005562#M23351</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T13:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005568#M23353</link>
      <description>&lt;P&gt;output attached&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 14:13:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005568#M23353</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T14:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005583#M23355</link>
      <description>&lt;P&gt;Also getting the following logs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;165&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-5-750001: Local:172.31.42.1:500 Remote:154.73.170.138:500 Username:Unknown IKEv2 Received request to establish an IPsec tunnel; local traffic selector = Address Range: 172.31.28.5-172.31.28.5 Protocol: 0 Port Range: 0-65535 ; remote traffic selector = Address Range: 192.168.112.212-192.168.112.212 Protocol: 0 Port Range: 0-65535&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-4-750003: Local:172.31.42.1:4500 Remote:154.73.170.138:4500 Username:154.73.170.138 IKEv2 Negotiation aborted due to ERROR: Auth exchange failed&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-4-752012: IKEv2 was unsuccessful at setting up a tunnel. Map Tag = MYMAP. Map Sequence Number = 23.&lt;BR /&gt;&amp;lt;163&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-3-752015: Tunnel Manager has failed to establish an L2L SA. All configured IKE versions failed to establish the tunnel. Map Tag= MYMAP. Map Sequence Number = 23.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;lt;165&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-5-750001: Local:172.31.42.1:500 Remote:154.73.170.138:500 Username:Unknown IKEv2 Received request to establish an IPsec tunnel; local traffic selector = Address Range: 172.31.28.5-172.31.28.5 Protocol: 0 Port Range: 0-65535 ; remote traffic selector = Address Range: 192.168.112.212-192.168.112.212 Protocol: 0 Port Range: 0-65535&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-4-750003: Local:172.31.42.1:4500 Remote:154.73.170.138:4500 Username:154.73.170.138 IKEv2 Negotiation aborted due to ERROR: Auth exchange failed&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-4-752012: IKEv2 was unsuccessful at setting up a tunnel. Map Tag = MYMAP. Map Sequence Number = 23.&lt;BR /&gt;&amp;lt;163&amp;gt;:Jan 02 16:46:33 EAT: %ASA-vpn-3-752015: Tunnel Manager has failed to establish an L2L SA. All configured IKE versions failed to establish the tunnel. Map Tag= MYMAP. Map Sequence Number = 23.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 14:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005583#M23355</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T14:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005585#M23356</link>
      <description>&lt;P&gt;Well the outcome of the debug is "NO_PROPOSAL_CHOSEN"=. You can see in the output the ASA is processing different IKEv2 proposals, none are matched.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;AES-CBC(25): SHA1(25): SHA96(25): DH_GROUP_1024_MODP/Group 2&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;AES-CBC(25): SHA256(25): SHA256(25): DH_GROUP_1536_MODP/Group 5&lt;/EM&gt; &amp;lt;&amp;lt; close but I think AES should be 256.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;3DES(25): SHA1(25): SHA96(25): DH_GROUP_1024_MODP/Group 2&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please confirm again the IKEv2 settings are an exact match on both the ASA and Sophos. Assuming they are, perhaps test using different algorthims.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please also provide the output of "show crypto ikev2 stats" and "show run crypto ikev2".&lt;/P&gt;
&lt;P&gt;Please confirm ASA version&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 14:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005585#M23356</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T14:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005586#M23359</link>
      <description>"Auth exchange failed" = re-enter the Pre-Shared Key (PSK) on both the ASA and Sophos.</description>
      <pubDate>Thu, 02 Jan 2020 14:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005586#M23359</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T14:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005681#M23362</link>
      <description>&lt;P&gt;AES-256 is set on both phase-1 and phase-2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Output below as requested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# show crypto ikev2 stats&lt;/P&gt;&lt;P&gt;Global IKEv2 Statistics&lt;BR /&gt;Active Tunnels: - 3&lt;BR /&gt;Previous Tunnels: 20&lt;BR /&gt;In Octets: 122070&lt;BR /&gt;In Packets: 322&lt;BR /&gt;In Drop Packets: 18&lt;BR /&gt;In Drop Fragments: 0&lt;BR /&gt;In Notifys: 785&lt;BR /&gt;In P2 Exchange: 23&lt;BR /&gt;In P2 Exchange Invalids: 0&lt;BR /&gt;In P2 Exchange Rejects: 3&lt;BR /&gt;In IPSEC Delete: 0&lt;BR /&gt;In IKE Delete: 0&lt;BR /&gt;Out Octets: 117496&lt;BR /&gt;Out Packets: 415&lt;BR /&gt;Out Drop Packets: 0&lt;BR /&gt;Out Drop Fragments: 0&lt;BR /&gt;Out Notifys: 711&lt;BR /&gt;Out P2 Exchange: 133&lt;BR /&gt;Out P2 Exchange Invalids: 0&lt;BR /&gt;Out P2 Exchange Rejects: 58&lt;BR /&gt;Out IPSEC Delete: 1&lt;BR /&gt;Out IKE Delete: 2&lt;BR /&gt;SAs Locally Initiated: 58&lt;BR /&gt;SAs Locally Initiated Failed: 61&lt;BR /&gt;SAs Remotely Initiated: 28&lt;BR /&gt;SAs Remotely Initiated Failed: 53&lt;BR /&gt;System Capacity Failures: 0&lt;BR /&gt;Authentication Failures: 63&lt;BR /&gt;Decrypt Failures: 0&lt;BR /&gt;Hash Failures: 0&lt;BR /&gt;Invalid SPI: 0&lt;BR /&gt;In Configs: 0&lt;BR /&gt;Out Configs: 0&lt;BR /&gt;In Configs Rejects: 0&lt;BR /&gt;Out Configs Rejects: 0&lt;BR /&gt;Previous Tunnels: 20&lt;BR /&gt;Previous Tunnels Wraps: 0&lt;BR /&gt;In DPD Messages: 0&lt;BR /&gt;Out DPD Messages: 17&lt;BR /&gt;Out NAT Keepalives: 45&lt;BR /&gt;IKE Rekey Locally Initiated: 0&lt;BR /&gt;IKE Rekey Remotely Initiated: 0&lt;BR /&gt;Locally Initiated IKE Rekey Rejected: 0&lt;BR /&gt;Remotely Initiated IKE Rekey Rejected: 0&lt;BR /&gt;CHILD Rekey Locally Initiated: 0&lt;BR /&gt;CHILD Rekey Remotely Initiated: 0&lt;/P&gt;&lt;P&gt;IKEV2 Call Admission Statistics&lt;BR /&gt;Max Active SAs: No Limit&lt;BR /&gt;Max In-Negotiation SAs: 1500&lt;BR /&gt;Cookie Challenge Threshold: Never&lt;BR /&gt;Active SAs: 0&lt;BR /&gt;In-Negotiation SAs: 0&lt;BR /&gt;Incoming Requests: 76&lt;BR /&gt;Incoming Requests Accepted: 76&lt;BR /&gt;Incoming Requests Rejected: 0&lt;BR /&gt;Outgoing Requests: 61&lt;BR /&gt;Outgoing Requests Accepted: 61&lt;BR /&gt;Outgoing Requests Rejected: 0&lt;BR /&gt;Rejected Requests: 0&lt;BR /&gt;Rejected Over Max SA limit: 0&lt;BR /&gt;Rejected Low Resources: 0&lt;BR /&gt;Rejected Reboot In Progress: 0&lt;BR /&gt;Cookie Challenges: 0&lt;BR /&gt;Cookie Challenges Passed: 0&lt;BR /&gt;Cookie Challenges Failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# show run crypto ikev2&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 5&lt;BR /&gt;prf sha256&lt;BR /&gt;lifetime seconds 5400&lt;BR /&gt;crypto ikev2 policy 100&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 17:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005681#M23362</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-02T17:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005688#M23364</link>
      <description>The stats confirm "Authentication Failures: 63" - Did you re-enter the PSK on both the ASA and Sophos as per a previous comment? It also confirms other failures, not sure if they are from older events. &lt;BR /&gt;&lt;BR /&gt;It's probably a good idea to clear the stats, that should provide a clearer indication on the problem. Clear the stats with the command "clear crypto ikev2 stats" and then attempt to re-establish the tunnel (change the PSK if you haven't already), check the ikev2 stats again and upload here.</description>
      <pubDate>Thu, 02 Jan 2020 18:02:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005688#M23364</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T18:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005974#M23367</link>
      <description>&lt;P&gt;changed the pre-shared key on both ends, cleared crypto ikev2 stats and run packet tracer command again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still the same result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;logs on ASA:&lt;/P&gt;&lt;P&gt;&amp;lt;165&amp;gt;:Jan 03 14:34:02 EAT: %ASA-vpn-5-752003: Tunnel Manager dispatching a KEY_ACQUIRE message to IKEv2. Map Tag = MYMAP. Map Sequence Number = 23.&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 03 14:34:02 EAT: %ASA-vpn-4-752011: IKEv1 Doesn't have a transform set specified&lt;BR /&gt;&amp;lt;165&amp;gt;:Jan 03 14:34:02 EAT: %ASA-vpn-5-750001: Local:172.31.42.1:500 Remote:154.73.170.138:500 Username:Unknown IKEv2 Received request to establish an IPsec tunnel; local traffic selector = Address Range: 172.31.28.5-172.31.28.5 Protocol: 0 Port Range: 0-65535 ; remote traffic selector = Address Range: 192.168.112.212-192.168.112.212 Protocol: 0 Port Range: 0-65535&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 03 14:34:03 EAT: %ASA-vpn-4-750003: Local:172.31.42.1:4500 Remote:154.73.170.138:4500 Username:154.73.170.138 IKEv2 Negotiation aborted due to ERROR: Auth exchange failed&lt;BR /&gt;&amp;lt;164&amp;gt;:Jan 03 14:34:03 EAT: %ASA-vpn-4-752012: IKEv2 was unsuccessful at setting up a tunnel. Map Tag = MYMAP. Map Sequence Number = 23.&lt;BR /&gt;&amp;lt;163&amp;gt;:Jan 03 14:34:03 EAT: %ASA-vpn-3-752015: Tunnel Manager has failed to establish an L2L SA. All configured IKE versions failed to establish the tunnel. Map Tag= MYMAP. Map Sequence Number = 23.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# sh cry ikev2 stats&lt;/P&gt;&lt;P&gt;Global IKEv2 Statistics&lt;BR /&gt;Active Tunnels: - 5&lt;BR /&gt;Previous Tunnels: 2&lt;BR /&gt;In Octets: 3624&lt;BR /&gt;In Packets: 12&lt;BR /&gt;In Drop Packets: 0&lt;BR /&gt;In Drop Fragments: 0&lt;BR /&gt;In Notifys: 28&lt;BR /&gt;In P2 Exchange: 2&lt;BR /&gt;In P2 Exchange Invalids: 0&lt;BR /&gt;In P2 Exchange Rejects: 0&lt;BR /&gt;In IPSEC Delete: 0&lt;BR /&gt;In IKE Delete: 0&lt;BR /&gt;Out Octets: 5566&lt;BR /&gt;Out Packets: 24&lt;BR /&gt;Out Drop Packets: 0&lt;BR /&gt;Out Drop Fragments: 0&lt;BR /&gt;Out Notifys: 28&lt;BR /&gt;Out P2 Exchange: 14&lt;BR /&gt;Out P2 Exchange Invalids: 0&lt;BR /&gt;Out P2 Exchange Rejects: 2&lt;BR /&gt;Out IPSEC Delete: 0&lt;BR /&gt;Out IKE Delete: 0&lt;BR /&gt;SAs Locally Initiated: 2&lt;BR /&gt;SAs Locally Initiated Failed: 2&lt;BR /&gt;SAs Remotely Initiated: 2&lt;BR /&gt;SAs Remotely Initiated Failed: 0&lt;BR /&gt;System Capacity Failures: 0&lt;BR /&gt;Authentication Failures: 2&lt;BR /&gt;Decrypt Failures: 0&lt;BR /&gt;Hash Failures: 0&lt;BR /&gt;Invalid SPI: 0&lt;BR /&gt;In Configs: 0&lt;BR /&gt;Out Configs: 0&lt;BR /&gt;In Configs Rejects: 0&lt;BR /&gt;Out Configs Rejects: 0&lt;BR /&gt;Previous Tunnels: 2&lt;BR /&gt;Previous Tunnels Wraps: 0&lt;BR /&gt;In DPD Messages: 0&lt;BR /&gt;Out DPD Messages: 2&lt;BR /&gt;Out NAT Keepalives: 2&lt;BR /&gt;IKE Rekey Locally Initiated: 0&lt;BR /&gt;IKE Rekey Remotely Initiated: 0&lt;BR /&gt;Locally Initiated IKE Rekey Rejected: 0&lt;BR /&gt;Remotely Initiated IKE Rekey Rejected: 0&lt;BR /&gt;CHILD Rekey Locally Initiated: 0&lt;BR /&gt;CHILD Rekey Remotely Initiated: 0&lt;/P&gt;&lt;P&gt;IKEV2 Call Admission Statistics&lt;BR /&gt;Max Active SAs: No Limit&lt;BR /&gt;Max In-Negotiation SAs: 1500&lt;BR /&gt;Cookie Challenge Threshold: Never&lt;BR /&gt;Active SAs: 1&lt;BR /&gt;In-Negotiation SAs: 0&lt;BR /&gt;Incoming Requests: 3&lt;BR /&gt;Incoming Requests Accepted: 3&lt;BR /&gt;Incoming Requests Rejected: 0&lt;BR /&gt;Outgoing Requests: 2&lt;BR /&gt;Outgoing Requests Accepted: 2&lt;BR /&gt;Outgoing Requests Rejected: 0&lt;BR /&gt;Rejected Requests: 0&lt;BR /&gt;Rejected Over Max SA limit: 0&lt;BR /&gt;Rejected Low Resources: 0&lt;BR /&gt;Rejected Reboot In Progress: 0&lt;BR /&gt;Cookie Challenges: 0&lt;BR /&gt;Cookie Challenges Passed: 0&lt;BR /&gt;Cookie Challenges Failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug output attached&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 11:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4005974#M23367</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-03T11:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4006004#M23370</link>
      <description>Comparing the output of the debugs the latest output is getting further into the IKE process, no more "NO_PROPOSAL_CHOSEN" errors. Ultimately it still fails with "AUTHENTICATION_FAILED". &lt;BR /&gt;&lt;BR /&gt;What peer identity is configured on the Sophos end? I assume it is using the local public IP address of the external interface and does that match exactly the tunnel-group on the ASA?&lt;BR /&gt;&lt;BR /&gt;I assume Sophos supports asymmetric pre-shared keys (a local psk and another for remote psk)? Provide screenshot to help assist.</description>
      <pubDate>Fri, 03 Jan 2020 12:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4006004#M23370</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-03T12:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4006060#M23429</link>
      <description>&lt;P&gt;If you are very sure that the PSK is not an issue, then please go back to IKEv1 and test the Tunnel.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 14:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4006060#M23429</guid>
      <dc:creator>InTheJuniverse</dc:creator>
      <dc:date>2020-01-03T14:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN connection between ASAv30 and Sophos XG210</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4006762#M23430</link>
      <description>&lt;P&gt;The remote ID was configured incorrectly on the Sophos.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, added the following commands on ASA, since lifetime was defined on phase-2 of Sophos:&lt;/P&gt;&lt;P&gt;crypto map MYMAP 10 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map MYMAP 10 set security-association lifetime kilobytes unlimited&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN is now established! Thanks,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; for your support and prompt responses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 04:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-connection-between-asav30-and-sophos-xg210/m-p/4006762#M23430</guid>
      <dc:creator>S.U.H.E.L</dc:creator>
      <dc:date>2020-01-06T04:54:53Z</dc:date>
    </item>
  </channel>
</rss>

