<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic tunnel group xauth in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583346#M593086</link>
    <description>&lt;P&gt;My question is I cannot tell from the ASA's response if it actually took my no-xauth command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I started with this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 type ipsec-l2l&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; pre-shared-key *****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;issued these commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;isakmp peer ip 69.X.X.170 no-xauth&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and got this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 type ipsec-l2l&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 general-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; pre-shared-key *****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the addition of the general-attributes line mean the no-xauth is effective? &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:42:09 GMT</pubDate>
    <dc:creator>lcaruso</dc:creator>
    <dc:date>2019-03-11T19:42:09Z</dc:date>
    <item>
      <title>tunnel group xauth</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583346#M593086</link>
      <description>&lt;P&gt;My question is I cannot tell from the ASA's response if it actually took my no-xauth command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I started with this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 type ipsec-l2l&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; pre-shared-key *****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;issued these commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;isakmp peer ip 69.X.X.170 no-xauth&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and got this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 type ipsec-l2l&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 general-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tunnel-group 69.X.X.170 ipsec-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; pre-shared-key *****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the addition of the general-attributes line mean the no-xauth is effective? &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583346#M593086</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2019-03-11T19:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: tunnel group xauth</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583347#M593087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The no xauth is not effective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default the tunnel group has some general attributes, hence it will always come in the output of sh tunnel-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you need to configure the following to disable the xauth:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;ASA(config)#&lt;STRONG&gt;tunnel-group example-group ipsec-attributes&lt;/STRONG&gt;
ASA(config-tunnel-ipsec)#&lt;STRONG&gt;isakmp ikev1-user-authentication none&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The following link will explain the same.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml#solution21"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml#solution21&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: please mark this thread as answered if you feel your query is resolved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 17:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583347#M593087</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-01-30T17:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: tunnel group xauth</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583348#M593088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 00:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583348#M593088</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-01-31T00:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: tunnel group xauth</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583349#M593089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible to have it show this is enabled somehow? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 01:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583349#M593089</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-02-02T01:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: tunnel group xauth</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583350#M593090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you read the link a bit more in detail. you will notice the following line:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;If a LAN-to-LAN tunnel and a Remote Access VPN tunnel are configured on the same crypto map, the LAN-to-LAN peer is prompted for XAUTH information, and the LAN-to-LAN tunnel fails with "&lt;STRONG&gt;&lt;EM&gt;CONF_XAUTH&lt;/EM&gt;&lt;/STRONG&gt; " in the output of the &lt;STRONG&gt;show crypto isakmp sa&lt;/STRONG&gt; command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;So by default it will ask for xauth if the above condition is met.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;we can check the hidden configuration by the command "sh run all" or if you want to check the same for the tunnel group, you can input "sh run all tunnel-group &lt;XYZ&gt;".&lt;/XYZ&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;Anisha&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;P.S.: please rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Feb 2011 16:42:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-group-xauth/m-p/1583350#M593090</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-02-02T16:42:15Z</dc:date>
    </item>
  </channel>
</rss>

