04-05-2018 04:20 AM - edited 03-05-2019 10:13 AM
Hello Experts,
Maybe anyone can help to bring UP my VPN tunnel.
SPOKE#sh cry isa policy
Global IKE policy
Protection suite of priority 20
encryption algorithm: AES - Advanced Encryption Standard (256 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume Limit
HUB.
Global IKE policy
Protection suite of priority 20
encryption algorithm: AES - Advanced Encryption Standard (256 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume Limit
Both are same still i am getting this error:
.Apr 5 11:14:15.475: ISAKMP-ERROR: (0):Diffie-Hellman group offered does not match policy!
.Apr 5 11:14:15.475: ISAKMP-ERROR: (0):atts are not acceptable. Next payload is 0
.Apr 5 11:14:15.475: ISAKMP-ERROR: (0):no offers accepted!
.Apr 5 11:14:15.479: ISAKMP-ERROR: (0):phase 1 SA policy not acceptable! (local 106.120.64.62 remote 195.243.205.120)
.Apr 5 11:14:15.479: ISAKMP-ERROR: (0):deleting SA reason "Phase1 SA policy proposal not accepted" state (I) MM_NO_STATE (peer 195.243.205.120)
.Apr 5 11:14:15.479: ISAKMP-ERROR: (0):(0): FSM action returned error: 2
.Apr 5 11:14:15.479: ISAKMP-ERROR: (0):deleting SA reason "Phase1 SA policy proposal not accepted" state (I) MM_NO_STATE (peer 195.243.205.120)
.Apr 5 11:14:17.027: ISAKMP-ERROR: (0):Diffie-Hellman group offered does not match policy!
.Apr 5 11:14:17.027: ISAKMP-ERROR: (0):atts are not acceptable. Next payload is 0
.Apr 5 11:14:17.027: ISAKMP-ERROR: (0):no offers accepted!
.Apr 5 11:14:25.475: ISAKMP-ERROR: (0):Diffie-Hellman group offered does not match policy!
.Apr 5 11:14:25.475: ISAKMP-ERROR: (0):atts are not acceptable. Next payload is 0
.Apr 5 11:14:25.475: ISAKMP-ERROR: (0):no offers accepted!
Pre shared key is exactly same...
Thanks
04-05-2018 04:58 AM
Hi
Have you verified the configuration of: crypto isakmp key AAAA address x.x.x.x.
04-05-2018 05:46 AM
yes its corerct on both side.
04-05-2018 05:33 AM
Hello,
in addition to Julio's post, make sure your 'crypto isakmp key' statement has 'no-xauth' added at the end...
04-05-2018 05:48 AM
normally all other tunnels which are up and working using "no-xauth"
I removed the no-xauth for specific Location and still tunnels are not coming UP.
Thanks
04-05-2018 06:42 AM
Hello,
sorry for the misunderstanding, the idea was to check if no-xauth' was there. By all means don't remove it.
Can you post the output of 'sh crypto isakmp default policy' ?
04-05-2018 06:56 AM
here is the Output from Spoke:
Default IKE policy
Default protection suite of priority 65507
encryption algorithm: AES - Advanced Encryption Standard (128 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #5 (1536 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite of priority 65508
encryption algorithm: AES - Advanced Encryption Standard (128 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #5 (1536 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite of priority 65509
encryption algorithm: AES - Advanced Encryption Standard (128 bit keys).
hash algorithm: Message Digest 5
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #5 (1536 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite of priority 65510
encryption algorithm: AES - Advanced Encryption Standard (128 bit keys).
hash algorithm: Message Digest 5
authentication method: Pre-Shared Key
Diffie-Hellman group: #5 (1536 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite of priority 65511
encryption algorithm: Three key triple DES
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #2 (1024 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite of priority 65512
encryption algorithm: Three key triple DES
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #2 (1024 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite of priority 65513
encryption algorithm: Three key triple DES
hash algorithm: Message Digest 5
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #2 (1024 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite of priority 65514
encryption algorithm: Three key triple DES
hash algorithm: Message Digest 5
authentication method: Pre-Shared Key
Diffie-Hellman group: #2 (1024 bit)
lifetime: 86400 seconds, no volume Limit
Thanks
04-05-2018 07:48 AM
Hi
Is possible to share the configuration removing the sensitive information.
Thank you in advance.
04-06-2018 02:49 AM
04-06-2018 09:11 AM - edited 04-06-2018 09:15 AM
Hello
a couple of your profiles are using group 5 and pre-share key my understanding only group 1- 2 and not group 5 supports psk
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #5 (1536 bit)
res
Paul
04-12-2018 12:19 AM - edited 04-12-2018 12:20 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide