<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: site to site tunnel between IOS router and ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679874#M422550</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bill,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000610: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039):Need XAUTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000611: *Sep 27 10:42:15.094 PCTime: ISAKMP: set new node 920927400 to CONF_XAUTH   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000612: *Sep 27 10:42:15.094 PCTime: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000613: *Sep 27 10:42:15.094 PCTime: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000614: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039): initiating peer config to 74.92.97.166. ID = 920927400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000615: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039): sending packet to 74.92.97.166 my_port 4500 peer_port 4500 (R) CONF_XAUTH   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; --More--         000616: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000617: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039):Old State = IKE_P1_COMPLETE  New State = IKE_XAUTH_REQ_SENT &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should not be going for Extended Authentication.  Since you have the client and the L2L on the same router and the clients are configured for Extended authentication, the router will ask for XAUTH unless you configure the command "no-xauth" after the  pre-shared key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please implement the command:&lt;/P&gt;&lt;P&gt;crypto isakmp key cleartext address 74.92.97.166 no-xauth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Feb 2007 20:34:12 GMT</pubDate>
    <dc:creator>ggilbert</dc:creator>
    <dc:date>2007-02-13T20:34:12Z</dc:date>
    <item>
      <title>site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679861#M422537</link>
      <description>&lt;P&gt;I've combed through the configs on both sides of this tunnel 4x now and the policies look like they match.  I followd the note &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094498.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094498.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My crypto access lsits are good and my nat on the IOS side are bundled with a route map and look good.  On the ASA side traffic from the ASA side to the remote tunnel is exempt from NAT.  Each side already has a site to site tunnel setup, so i've added the appropriate lines to the existing crypto maps that include peer, transform set, and match address "access-list".  The crypto isakmp polcies on both ends are compatible.  I've attached some configs and debugs(from IOS router), but essentially the log on the ASA starts out with phase 1 completed, and then reads received non routing notify message, no proposal chosen and then it goes to IKE lost connection to remote peer, deleting connection, removing peer from correlator table failed, no match, and finally session disconnected, reason lost service.   &lt;/P&gt;&lt;P&gt;Connection is good, their other tunnel stays up along with the remote access vpn config.  &lt;/P&gt;&lt;P&gt;I found a note that recommends checking any security access-list, so I removed them, but no luck, and one from cisco related to a concentrator, but had some sound logic to it, &lt;/P&gt;&lt;P&gt;Normally appears with the&lt;/P&gt;&lt;P&gt;corresponding Cisco VPN 3000&lt;/P&gt;&lt;P&gt;concentrator message: No proposal&lt;/P&gt;&lt;P&gt;chosen(14). This is a result of the&lt;/P&gt;&lt;P&gt;connections being host-to-host.&lt;/P&gt;&lt;P&gt;The router configuration had the&lt;/P&gt;&lt;P&gt;IPSec proposals ordered so that the&lt;/P&gt;&lt;P&gt;proposal chosen for the router&lt;/P&gt;&lt;P&gt;matched the access-list, but not the&lt;/P&gt;&lt;P&gt;peer. The access-list had a larger&lt;/P&gt;&lt;P&gt;network that included the host that&lt;/P&gt;&lt;P&gt;was intersecting traffic.&lt;/P&gt;&lt;P&gt;Make the router proposal for this&lt;/P&gt;&lt;P&gt;concentrator-to-router connection&lt;/P&gt;&lt;P&gt;first in line, so that it matches the&lt;/P&gt;&lt;P&gt;specific host first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;however it didn't work either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679861#M422537</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2020-02-21T09:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679862#M422538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've added attachments&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 21:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679862#M422538</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-12T21:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679863#M422539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bill,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked at the PIX config and seems like there is a mismatch on the peer statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please take a look at the tunnel-group IP address and the IP address on the set peer commands on the crypto map section.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which one is correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 22:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679863#M422539</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2007-02-12T22:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679864#M422540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry, I was trying to remove the real IP addresses but missed them in the group attribute statements.  The remote peer from the pix is 71.33.245.25 (the tunnel I'm trying to create now) and another tunnel 65.202.177.130 (already established).  It looks like I attached the IOS debug twice instead of the running config.  I don't have access to that file right now, but will again in a few hours.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 22:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679864#M422540</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-12T22:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679865#M422541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gilbert, here are the configs without editing the peer IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 01:47:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679865#M422541</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-13T01:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679866#M422542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The config of ASA looks good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The policies on the ASA and the router should match.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please enable debugs on the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deb cry isa&lt;/P&gt;&lt;P&gt;deb cry ipsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable debugs on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deb cry isa 129&lt;/P&gt;&lt;P&gt;deb cry ipsec 129&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do "cle cry isa" and "cle cry sa" on the router and then initiate the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture the debugs on the router and the ASA - Send them to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me take a look.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 15:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679866#M422542</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2007-02-13T15:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679867#M422543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 15:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679867#M422543</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-13T15:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679868#M422544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking at the config on the IOS router, I do see that you are doing NAT. Please implement the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list ext 102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 deny ip 192.168.100.0 0.0.0.255 10.4.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA, look at the statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 15 set transform-set CO ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please make sure that you have only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 15 set transform-set CO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this fixes the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate it, if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 17:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679868#M422544</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2007-02-13T17:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679869#M422545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, added the deny ip line to the access-list 102 with a log on the end.  When pinging though nothing shows up for 10.4.1.100, however the logs do reflect a test ping to the working tunnel.  Not sure if they should be showing up regardless of the tunnel's condition.  I mean should a failed attempt still show up if deny ip 192.168.100.0 0.0.0.255 10.4.1.0 0.0.0.255 log exists?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also removed the 2nd transform-set ESP-3DES-SHA, but still get the same behaviour and errors.  "received non-routine notify message.  No proposal chosen"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 18:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679869#M422545</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-13T18:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679870#M422546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is your email address?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 18:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679870#M422546</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2007-02-13T18:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679871#M422547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="mailto:bill.stegman@transcore.com"&gt;bill.stegman@transcore.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 18:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679871#M422547</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-13T18:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679872#M422548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bill,&lt;/P&gt;&lt;P&gt;According to the logs &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;001262: *Sep 26 11:00:21.467 PCTime: ISAKMP (0:2009): NAT found, the node outside NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;001263: *Sep 26 11:00:21.467 PCTime: ISAKMP:(2009):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It stops after NAT detection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Send me the full logs by clearing the tunnel and initiating from the router side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 20:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679872#M422548</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2007-02-13T20:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679873#M422549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;debug from router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 20:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679873#M422549</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-13T20:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679874#M422550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bill,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000610: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039):Need XAUTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000611: *Sep 27 10:42:15.094 PCTime: ISAKMP: set new node 920927400 to CONF_XAUTH   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000612: *Sep 27 10:42:15.094 PCTime: ISAKMP/xauth: request attribute XAUTH_USER_NAME_V2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000613: *Sep 27 10:42:15.094 PCTime: ISAKMP/xauth: request attribute XAUTH_USER_PASSWORD_V2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000614: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039): initiating peer config to 74.92.97.166. ID = 920927400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000615: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039): sending packet to 74.92.97.166 my_port 4500 peer_port 4500 (R) CONF_XAUTH   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; --More--         000616: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000617: *Sep 27 10:42:15.094 PCTime: ISAKMP:(2039):Old State = IKE_P1_COMPLETE  New State = IKE_XAUTH_REQ_SENT &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should not be going for Extended Authentication.  Since you have the client and the L2L on the same router and the clients are configured for Extended authentication, the router will ask for XAUTH unless you configure the command "no-xauth" after the  pre-shared key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please implement the command:&lt;/P&gt;&lt;P&gt;crypto isakmp key cleartext address 74.92.97.166 no-xauth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 20:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679874#M422550</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2007-02-13T20:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679875#M422551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bill,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take care&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate it, if this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 20:37:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679875#M422551</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2007-02-13T20:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: site to site tunnel between IOS router and ASA</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679876#M422552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;works great now, thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 20:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-tunnel-between-ios-router-and-asa/m-p/679876#M422552</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2007-02-13T20:50:37Z</dc:date>
    </item>
  </channel>
</rss>

