cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2398
Views
5
Helpful
3
Replies

I configure IKEv2 on cisco router to Palo Alto but need to remove pfs from the config

jomo frank
Level 1
Level 1

Hello Support,

 

I configure my cisco 892 router to do ipsec vpn using IKEv2 but the Palo Alto at third party is not using pfs  how can I remove pfs from the configure and just include set group20

 

crypto map vpn 10 ipsec-isakmp
set peer 1.1.1.1 --> Palo Alto VPN Peer
set transform-set tset
set pfs group20
set ikev2-profile BOG_TEST
match address vpn

 

Regards

 

 

2 Accepted Solutions

Accepted Solutions

johnlloyd_13
Level 9
Level 9

hi,

are you referring to keep 'group 20' in the IKEv2 policy/proposal? can you post a 'show run | sec crypto' output.

to remove 'group 20' in the crypto map, just use a 'no' to negate the line.

crypto map vpn 10
 no set pfs group20

 

make sure you got 'group 20' in any of your IKEv2 proposal. example below:

 

crypto ikev2 proposal <PROPOSAL NAME>
encryption aes-cbc-128
integrity sha1
group 20

 

View solution in original post

johnlloyd_13
Level 9
Level 9

hi,

make sure both the 892 router and PA FW have identical IKEv2 phase 1 and phase 2 policies to build the IPSec SA.

can you post a 'show run | sec crypto' output to verify?

 

View solution in original post

3 Replies 3

johnlloyd_13
Level 9
Level 9

hi,

are you referring to keep 'group 20' in the IKEv2 policy/proposal? can you post a 'show run | sec crypto' output.

to remove 'group 20' in the crypto map, just use a 'no' to negate the line.

crypto map vpn 10
 no set pfs group20

 

make sure you got 'group 20' in any of your IKEv2 proposal. example below:

 

crypto ikev2 proposal <PROPOSAL NAME>
encryption aes-cbc-128
integrity sha1
group 20

 

Hello John,

 

I have group 14 in my IKEv2 proposal.

So your are saying once i this configured in my proposal I could negate the without any problems

I new to IKEv2, hence i am unsure if I could leave the group 14 line in the crypto map

 

 

Regards

johnlloyd_13
Level 9
Level 9

hi,

make sure both the 892 router and PA FW have identical IKEv2 phase 1 and phase 2 policies to build the IPSec SA.

can you post a 'show run | sec crypto' output to verify?