03-19-2015 12:41 AM - edited 02-21-2020 08:08 PM
Hi,
I was trouble shooting an IPsec VPN site-to-site tunnel between two ASA. The tunnel was working but the lifetime was too short, so we had to change it. After changes the tunnel was not coming back.
I noticed that in one site, the
ikev2 remote-authentication pre-shared-key
ikev2 local-authentication pre-shared-key
under tunnel-group xx.xx.xx.xx ipsec-attributes, was encrypted ( pre-shared-key 8 dsafadsfafadfafdfghdfgh) and in the other site was not encrypted (pre-shared-key ******).
After making the change to remove the encryption, the tunnel came up.
So my question is, could this change be the issue? Does it play any role if from the one site it is encrypted and in the other not?
Thanks
Notis
03-24-2015 01:51 AM
Hi,
Configuration showing the key in encrypted or clear format should not be a issue, as long as the hash matches (they are same clear string). You need to check how the change of lifetime carried out. The following debugs / logs at the time of issue would have helped
more system running-config | in key
debug cry condition peer <peer ip>
debug cry isa 127
debug cry ips 127
Regards,
Abaji.
03-24-2015 05:13 AM
Thank you for the answer. I will check it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide