03-16-2022 04:15 AM
Hi I have configured a site to site Vpn with Azure and my remote site uses Cisco ASA firewall.
in my Azure the status shows as connected but in the site end it shows the below error..
"IKEv2 Selected IKEv2 encryption algorithm (AES-CBC-128) is not strong enough to secure proposed IPsec encryption algorithm (AES-CBC-256)."
we are not able to ping from site to azure and azure to site due to this.
Solved! Go to Solution.
03-16-2022 04:49 AM - edited 03-16-2022 04:55 AM
ASA(config)# crypto ikev2 proposal proposal-1
ASA(config-ikev2-proposal)# encryption aes-cbc-256<- if this not found then by default the AES-256 use CBC.
03-16-2022 04:53 AM
Dear MHM Cisco World
Thank you for the reply will check on this and let you know
03-16-2022 05:02 AM
@kamal.bernard I would check the IKEv2 Policy, as the error would seem to indicate you've got a more secure algorithm (AES 256) configured for the IPSec proposal than you do for the IKEv2 policy (AES 128?).
Check "show run crypto ikev2" and ensure you are using AES CBC 256.
03-16-2022 05:32 AM
03-16-2022 04:49 AM - edited 03-16-2022 04:55 AM
ASA(config)# crypto ikev2 proposal proposal-1
ASA(config-ikev2-proposal)# encryption aes-cbc-256<- if this not found then by default the AES-256 use CBC.
03-16-2022 04:53 AM
Dear MHM Cisco World
Thank you for the reply will check on this and let you know
03-16-2022 05:02 AM
@kamal.bernard I would check the IKEv2 Policy, as the error would seem to indicate you've got a more secure algorithm (AES 256) configured for the IPSec proposal than you do for the IKEv2 policy (AES 128?).
Check "show run crypto ikev2" and ensure you are using AES CBC 256.
03-16-2022 05:32 AM
Hi Rob
Thank you for the reply
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide