Resolved! Which isakmp policies are being used?
I have 30 or so ipsec crypto maps that peer with mixed vendor equipment to set up ipsec/isakmp vpns using psk. I also have quite a few crypto isakmp policies that are weak (des) and some that aren't probably used at all. Is there an easy wa...