03-12-2018 09:06 AM - edited 03-05-2019 10:05 AM
I have two Cisco 2911 routers communicating over the Internet using an IPSec site-to-site tunnel with pre-shared keys and isakmp aggressive mode. Can I reconfigure the routers to use isakmp main mode versus aggressive mode while still using pre-shared keys? Also, the main router where the site-to-site tunnels are being establish also supports IPSec client connections. If I change the router to main mode "crypto isakmp aggressive-mode disable"my IPSec clients no longer connect. Is there a way allow the clients to use isakmp main mode too or can they only use isakmp aggressive mode?
Thanks
GW
03-12-2018 02:25 PM
If you have a "real" S2S connection (that is, on both routers you reference the other sides IP), then this should work also in main-mode with PSK. That would be the "normal" way to configure it. If it doesn't work in your scenario, then something else is going wrong there.
03-12-2018 02:37 PM
Below is the remote site config
crypto keyring site2site
pre-shared-key address x.x.x.50 key 6 xxxxxxxx
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp keepalive 10 periodic
!
crypto isakmp client configuration group remote-clients
key 6 xxxxxxxx
pool VPN-clients
acl 104
max-logins 1
crypto isakmp profile site-to-site
description Site to site VPN Tunnel profile connection
keyring site2site
match identity address x.x.x.50 255.255.255.255
keepalive 30 retry 3
crypto isakmp profile vpnclients
description VPN Clients profile connection
match identity group remote-clients
client authentication list vpnclientauth
isakmp authorization list vpngroupauth
client configuration address respond
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec fragmentation after-encryption
crypto ipsec df-bit clear
!
crypto dynamic-map SDM_DYNMAP_1 2
set transform-set ESP-3DES-SHA
set isakmp-profile vpnclients
reverse-route
!
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
set peer x.x.x.50
set security-association idle-time 86400
set transform-set ESP-3DES-SHA
set isakmp-profile site-to-site
match address 100
crypto map SDM_CMAP_1 65535 ipsec-isakmp dynamic SDM_DYNMAP_1
interface GigabitEthernet0/0
ip address dhcp client-id GigabitEthernet0/0
crypto map SDM_CMAP_1
03-12-2018 02:44 PM
I just see that I didn't read your message right. Not the S2S-tunel stops working but the client-VPN. That is normal. For EzVPN with PSKs, aggressive mode is used. Only if you migrate to certificate-based authentication, main mode is used.
Are you sure that your S2S-VPN is also using aggressive mode? Does "show crypto isakmp sa detail" show that?
03-12-2018 03:10 PM
The site to site VPN is working and the VPN client is working but I want the site to site VPN to use main mode versus aggressive mode.
GW
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide