<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX Remote Access VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003094#M916457</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup a PIX 515 running v803 for remote access from a VPN client. I cyrrently have site-to-site VPN's which have been setup and work fine. Currently, when i connect using the VPN client (v5), although Phase 1 completes Phase 2 does not, I just get IKE negotiation failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 5 set transform-set TRANS_ESP_3DES_MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 15 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 30 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 40 set transform-set ESP-DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 50 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 50 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map vpnmap 65535 ipsec-isakmp dynamic vpnmap_dynmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto map vpnmap interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy client_vpn_access internal&lt;/P&gt;&lt;P&gt;group-policy client_vpn_access attributes&lt;/P&gt;&lt;P&gt;  vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt;  dns-server value 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group client_vpn_access type remote-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group client_vpn_access general-attributes&lt;/P&gt;&lt;P&gt;  default-group-policy client_vpn_access&lt;/P&gt;&lt;P&gt;  address-pool  client_vpn_access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group client_vpn_access ipsec-attributes&lt;/P&gt;&lt;P&gt;  pre-shared-key presharedkey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### Log from Cisco VPN Client v5 ####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;445    21:12:12.686  07/18/08  Sev=Info/4	CM/0x6310000E&lt;/P&gt;&lt;P&gt;Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;467    21:12:12.766  07/18/08  Sev=Info/4	IKE/0x63000014&lt;/P&gt;&lt;P&gt;RECEIVING &amp;lt;&amp;lt;&amp;lt; ISAKMP OAK INFO *(HASH, NOTIFY:NO_PROPOSAL_CHOSEN) from x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;470    21:12:12.766  07/18/08  Sev=Info/4	IKE/0x63000017&lt;/P&gt;&lt;P&gt;Marking IKE SA for deletion  (I_Cookie=29790EF2FE6728A8 R_Cookie=D4C90BEBCF7838BE) reason = DEL_REASON_IKE_NEG_FAILED&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;545    21:46:40.379  07/18/08  Sev=Info/4	CM/0x63100012&lt;/P&gt;&lt;P&gt;Phase 1 SA deleted before first Phase 2 SA is up cause by "DEL_REASON_IKE_NEG_FAILED".  0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can you help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 13:16:43 GMT</pubDate>
    <dc:creator>alyasrazzaq</dc:creator>
    <dc:date>2019-03-11T13:16:43Z</dc:date>
    <item>
      <title>PIX Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003094#M916457</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup a PIX 515 running v803 for remote access from a VPN client. I cyrrently have site-to-site VPN's which have been setup and work fine. Currently, when i connect using the VPN client (v5), although Phase 1 completes Phase 2 does not, I just get IKE negotiation failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 5 set transform-set TRANS_ESP_3DES_MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 15 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 30 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 40 set transform-set ESP-DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 50 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 50 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map vpnmap 65535 ipsec-isakmp dynamic vpnmap_dynmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto map vpnmap interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy client_vpn_access internal&lt;/P&gt;&lt;P&gt;group-policy client_vpn_access attributes&lt;/P&gt;&lt;P&gt;  vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt;  dns-server value 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group client_vpn_access type remote-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group client_vpn_access general-attributes&lt;/P&gt;&lt;P&gt;  default-group-policy client_vpn_access&lt;/P&gt;&lt;P&gt;  address-pool  client_vpn_access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group client_vpn_access ipsec-attributes&lt;/P&gt;&lt;P&gt;  pre-shared-key presharedkey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### Log from Cisco VPN Client v5 ####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;445    21:12:12.686  07/18/08  Sev=Info/4	CM/0x6310000E&lt;/P&gt;&lt;P&gt;Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;467    21:12:12.766  07/18/08  Sev=Info/4	IKE/0x63000014&lt;/P&gt;&lt;P&gt;RECEIVING &amp;lt;&amp;lt;&amp;lt; ISAKMP OAK INFO *(HASH, NOTIFY:NO_PROPOSAL_CHOSEN) from x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;470    21:12:12.766  07/18/08  Sev=Info/4	IKE/0x63000017&lt;/P&gt;&lt;P&gt;Marking IKE SA for deletion  (I_Cookie=29790EF2FE6728A8 R_Cookie=D4C90BEBCF7838BE) reason = DEL_REASON_IKE_NEG_FAILED&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;545    21:46:40.379  07/18/08  Sev=Info/4	CM/0x63100012&lt;/P&gt;&lt;P&gt;Phase 1 SA deleted before first Phase 2 SA is up cause by "DEL_REASON_IKE_NEG_FAILED".  0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can you help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003094#M916457</guid>
      <dc:creator>alyasrazzaq</dc:creator>
      <dc:date>2019-03-11T13:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003095#M916458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;deb crypto isakmp 10&lt;/P&gt;&lt;P&gt;deb crypto ipsec 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jul 2008 20:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003095#M916458</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-07-18T20:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003096#M916463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please post your isakmp policies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run all isakmp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jul 2008 02:02:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003096#M916463</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-07-19T02:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003097#M916471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the debugs attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jul 2008 09:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003097#M916471</guid>
      <dc:creator>bjssccouser</dc:creator>
      <dc:date>2008-07-19T09:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003098#M916479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;crypto isakmp identity address&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;crypto isakmp policy 40&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 60&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 80&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jul 2008 09:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003098#M916479</guid>
      <dc:creator>bjssccouser</dc:creator>
      <dc:date>2008-07-19T09:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003099#M916486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no crypto dynamic-map vpnmap_dynmap 5 set transform-set TRANS_ESP_3DES_MD5 &lt;/P&gt;&lt;P&gt;no crypto dynamic-map vpnmap_dynmap 15 set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt;no crypto dynamic-map vpnmap_dynmap 30 set transform-set ESP-DES-MD5 &lt;/P&gt;&lt;P&gt;no crypto dynamic-map vpnmap_dynmap 40 set transform-set ESP-DES-SHA &lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 50 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map vpnmap_dynmap 50 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and show me your transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jul 2008 13:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003099#M916486</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-07-19T13:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003100#M916494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have removed the dynamic crypto maps as above, which has resulted in the Cisco VPN client now connecting. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I had to also remove pfs as I am also using the PIX for L2TP/IPSEC VPN from a Windows client. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you explain why this wasn't working before? Shouldn't the VPN client have been presented with all the SA options and picked the one that suited it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jul 2008 18:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-remote-access-vpn/m-p/1003100#M916494</guid>
      <dc:creator>bjssccouser</dc:creator>
      <dc:date>2008-07-19T18:28:50Z</dc:date>
    </item>
  </channel>
</rss>

