<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec - &amp;quot;All IPSec SA proposals found unacceptable!&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313479#M859213</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help, we (the other side of the tunnel) seemed to have matched enough of the ISAKMP to create a whole new problem.&lt;/P&gt;&lt;P&gt;I'll start a new post&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Jun 2009 04:55:03 GMT</pubDate>
    <dc:creator>techsupport</dc:creator>
    <dc:date>2009-06-22T04:55:03Z</dc:date>
    <item>
      <title>IPSec - "All IPSec SA proposals found unacceptable!"</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313474#M859207</link>
      <description>&lt;P&gt;Trying to setup a l2l vpn between 2 ASAs and came across this in the log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jun 21 17:07:46 [IKEv1]: Group = 71.172.68.18, IP = 71.172.68.18, IKE Remote Peer configured for crypto map: vpn_map&lt;/P&gt;&lt;P&gt;Jun 21 17:07:46 [IKEv1 DEBUG]: Group = 71.172.68.18, IP = 71.172.68.18, processing IPSec SA payload&lt;/P&gt;&lt;P&gt;Jun 21 17:07:46 [IKEv1]: Group = 71.172.68.18, IP = 71.172.68.18, All IPSec SA proposals found unacceptable!&lt;/P&gt;&lt;P&gt;Jun 21 17:07:46 [IKEv1 DEBUG]: Group = 71.172.68.18, IP = 71.172.68.18, sending notify message&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313474#M859207</guid>
      <dc:creator>techsupport</dc:creator>
      <dc:date>2019-03-11T15:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec - "All IPSec SA proposals found unacceptable!"</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313475#M859209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Compare your crypto maps between the 2 firewalls. The IPSEC proposal is the phase 2 proposal (transform set, group, pfs, etc)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Jun 2009 23:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313475#M859209</guid>
      <dc:creator>jeromecandiff</dc:creator>
      <dc:date>2009-06-21T23:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec - "All IPSec SA proposals found unacceptable!"</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313476#M859210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like a mis-matched transform set between the peers.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run crypto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the transform sets referenced by your crypto map.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jun 2009 00:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313476#M859210</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2009-06-22T00:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec - "All IPSec SA proposals found unacceptable!"</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313477#M859211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These are the two configs, I'm not clear on&lt;/P&gt;&lt;P&gt;how crypto maps are linked to isakmp policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whats the best way to set both sides to the&lt;/P&gt;&lt;P&gt;same. I can see that both sides are using&lt;/P&gt;&lt;P&gt;3des sha group 2. I get confused about policy 1 vs. 10 , 20 etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 71.X.68.X ABC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPN_TO_ABC extended permit ip host 10.20.12.127 host 192.168.13.3 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_ACCESS_IN extended permit ip host 192.168.13.3 host 10.20.12.127 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat_inside extended permit ip host 10.20.12.127 host 192.168.13.3&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat_inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn_map 26 match address VPN_TO_ABC&lt;/P&gt;&lt;P&gt;crypto map vpn_map 26 set peer ABC &lt;/P&gt;&lt;P&gt;crypto map vpn_map 26 set transform-set 3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 71.X.68.X type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 71.X.68.X ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map vpn_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 198.63.227.53 XYZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPN_TO_XYZ extended permit ip 192.168.13.0 255.255.255.0 host 10.20.12.127&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_ACCESS_IN extended permit ip host 10.20.12.127 192.168.13.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no_nat0 extended permit ip 192.168.13.0 255.255.255.0 host 10.20.12.127&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no_nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address VPN_TO_XYZ&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer XYZ &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 198.X.227.X type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 198.X.227.X ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jun 2009 00:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313477#M859211</guid>
      <dc:creator>techsupport</dc:creator>
      <dc:date>2009-06-22T00:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec - "All IPSec SA proposals found unacceptable!"</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313478#M859212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The debug messages indicate a problem with the IKE phase 2 quick mode negotiation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a dynamic crypto map configured with a lower priority number in the first configuration?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also noticed that the encryption domains do not match.  One end specifies 192.168.13.0/24 while the other end specifies the 192.168.13.3 host.  This will need to be corrected.  &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jun 2009 03:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313478#M859212</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2009-06-22T03:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec - "All IPSec SA proposals found unacceptable!"</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313479#M859213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help, we (the other side of the tunnel) seemed to have matched enough of the ISAKMP to create a whole new problem.&lt;/P&gt;&lt;P&gt;I'll start a new post&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jun 2009 04:55:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-quot-all-ipsec-sa-proposals-found-unacceptable-quot/m-p/1313479#M859213</guid>
      <dc:creator>techsupport</dc:creator>
      <dc:date>2009-06-22T04:55:03Z</dc:date>
    </item>
  </channel>
</rss>

