<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Easy VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920087#M437659</link>
    <description>&lt;P&gt;Dears,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diagram,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Branch LAN&lt;/P&gt;&lt;P&gt; | |&lt;/P&gt;&lt;P&gt; R1----------------------R2---------------------R3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to establish a VPN connection from Branch LAN (R1) to R2 acting as a Easy VPN server, R1 is doing PAT for the branch users to go on the internet and for accessing the HO resources they should access through a VPN.R1 is acting in a client mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnels are not coming up, Attached are the configs, and the debugs,please help.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:02:31 GMT</pubDate>
    <dc:creator>jack samuel</dc:creator>
    <dc:date>2019-03-11T23:02:31Z</dc:date>
    <item>
      <title>Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920087#M437659</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diagram,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Branch LAN&lt;/P&gt;&lt;P&gt; | |&lt;/P&gt;&lt;P&gt; R1----------------------R2---------------------R3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to establish a VPN connection from Branch LAN (R1) to R2 acting as a Easy VPN server, R1 is doing PAT for the branch users to go on the internet and for accessing the HO resources they should access through a VPN.R1 is acting in a client mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnels are not coming up, Attached are the configs, and the debugs,please help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920087#M437659</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2019-03-11T23:02:31Z</dc:date>
    </item>
    <item>
      <title>Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920088#M437660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;mmm, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Preshared authentication offered but does not match policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you Change the preshared key to something else that is not cisco? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2012 22:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920088#M437660</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-04T22:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920089#M437661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still the same, no progress&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As u have seen the below&amp;nbsp; in the previous log and u asked me to change the key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:(0):Checking ISAKMP transform 18 against priority 10 policy&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; encryption 3DES-CBC&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hash MD5&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default group 2&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; auth pre-share&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life type in seconds&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life duration (VPI) of&amp;nbsp; 0x0 0x20 0xC4 0x9B &lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.367: ISAKMP:(0):Preshared authentication offered but does not match policy!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ALSO i have seen the below in the previous logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.383: ISAKMP:(0):Checking ISAKMP transform 18 against priority 65535 policy&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.383: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; encryption 3DES-CBC&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.383: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hash MD5&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.383: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default group 2&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.383: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; auth pre-share&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.383: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life type in seconds&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.387: ISAKMP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; life duration (VPI) of&amp;nbsp; 0x0 0x20 0xC4 0x9B &lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.387: ISAKMP:(0):Encryption algorithm offered does not match policy!&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:21:11.387: ISAKMP:(0):atts are not acceptable. Next payload is 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached the new logs as per ur request to change the key.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 May 2012 07:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920089#M437661</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-05-05T07:39:43Z</dc:date>
    </item>
    <item>
      <title>Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920090#M437662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jack, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, got tired and rack it up.... my mistake I didnt see it earlier. You have all the isamkp authorization, authentication and address respond on a crypto map that is not applied. (my dynmap) The dynamic crypto map is only used for setting up RRI and also setting up the Transform set, all other isakmp parameters are configured on the interface crypto map, that being said, please apply the folllowing changes: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2(config)#no crypto map mydynmap client authentication list vpnauthen&lt;/P&gt;&lt;P&gt;R2(config)#no crypto map mydynmap client authentication list vpnauthen&lt;/P&gt;&lt;P&gt;R2(config)#no crypto map mydynmap isakmp authorization list vpnauthor&lt;/P&gt;&lt;P&gt;R2(config)#no crypto map mydynmap client configuration address respond&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2(config)#crypto map cisco client authentication list vpnauthen&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2(config)#crypto map cisco isakmp authorization list vpnauthor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2(config)#crypto map cisco client configuration address respond&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Afer that, your Router one will go completely&amp;nbsp; crazy with the following errors: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:16:01.615: EZVPN(myvpn) Server does not allow save password option,&lt;/P&gt;&lt;P&gt;enter your username and password manually&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:16:01.615: EZVPN(myvpn): *** Logic Error ***&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:16:01.619: EZVPN(myvpn): Current State: READY&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:16:01.619: EZVPN(myvpn): Event: MODE_CONFIG_REPLY&lt;/P&gt;&lt;P&gt;*Mar&amp;nbsp; 1 00:16:01.619: EZVPN(myvpn): Resetting the EZVPN state machine to recover&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is because, you are not allowing save password on the group configuration, so add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group easyvpn &lt;/P&gt;&lt;P&gt; save-password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will do it, let me know how it goes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 May 2012 22:31:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920090#M437662</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-05T22:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920091#M437663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mike.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN is UP .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;But can u explain me the where did you find the issue in the logs. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I have configured the easy vpn through refering this book Network.Security.Technologies.and.Solutions. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The author showed here how to configure the Easy vpn and he applied the dynamic map to the above commands what u ask me to changed.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means the book is mis leading us.&lt;/P&gt;&lt;P&gt;Tx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2012 21:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920091#M437663</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-05-07T21:04:58Z</dc:date>
    </item>
    <item>
      <title>Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920092#M437664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That one goes by Yusuff Right? I used that for my written CCIE and I have been using it for the practical exam that I have. Which Page did you see that? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the issue is found when the presented group doesnt match any of the profiles. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2012 23:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920092#M437664</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-07T23:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920093#M437665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I saw in Chapter 15 IPSec VPN in section Implementing IPSec VPN and in sub topic Cisco Easy VPN.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Basically the issue is found when the presented group doesnt match any of the profiles&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; So the solution u provided me from ur expierience and not seen anything from the logs????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 05:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920093#M437665</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-05-08T05:45:07Z</dc:date>
    </item>
    <item>
      <title>Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920094#M437666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just opened my book and yet you are right. Weird, maybe is an old version of IOS or something. Not quite sure, here is the example most used: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/products/sw/secursw/ps2308/products_configuration_example09186a00801c4246.shtml"&gt;http://www.cisco.com/en/US/partner/products/sw/secursw/ps2308/products_configuration_example09186a00801c4246.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And regarding to your question, not really. You see in Agressive mode (that is mainly used on EasyVPN techologies) The client sends all the information on the first message. Then the router checks for the information send by the client and replies with its own information once it is found based on the first packet sent by the client, that mainly contains the identity, and group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You see that&amp;nbsp; none of the proposals were accepted, and that is because the Router did not found the group in order to match the pre-shared key send by the Initiator. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can read more about it here &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/docs/DOC-8125"&gt;https://supportforums.cisco.com/docs/DOC-8125#comment-11760&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 06:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn/m-p/1920094#M437666</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-08T06:14:46Z</dc:date>
    </item>
  </channel>
</rss>

