08-29-2001 06:46 PM - edited 02-21-2020 11:24 AM
I have the PIX 520 6.0(1). I am trying to set up the L2tp using the Microsoft CA. I can get the certificate from the Microsoft CA. However, when I try to establish the L2TP tunnel. I alway get the following error
Any thought about this?
This Error Message is from windows
Error 792: The L2TP connection attempt failed because security negotiation timed out
This Error Message is from PIX
ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy
ISAKMP: encryption 3DES-CBC
ISAKMP: hash SHA
ISAKMP: default group 2
ISAKMP: auth RSA sig
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x0 0x70 0x80
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 2 against priority 10 policy
ISAKMP: encryption 3DES-CBC
ISAKMP: hash MD5
ISAKMP: default group 2
ISAKMP: auth RSA sig
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x0 0x70 0x80
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 3 against priority 10 policy
ISAKMP: encryption DES-CBC
ISAKMP: hash SHA
ISAKMP: default group 1
ISAKMP: auth RSA sig
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x0 0x70 0x80
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 4 against priority 10 policy
ISAKMP: encryption DES-CBC
ISAKMP: hash MD5
ISAKMP: default group 1
ISAKMP: auth RSA sig
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x0 0x70 0x80
ISAKMP (0): atts are not acceptable. Next payload is 0
ISAKMP (0): Checking ISAKMP transform 1 against priority 20 policy
ISAKMP: encryption 3DES-CBC
ISAKMP: hash SHA
ISAKMP: default group 2
ISAKMP: auth RSA sig
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x0 0x70 0x80
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 2 against priority 20 policy
ISAKMP: encryption 3DES-CBC
ISAKMP: hash MD5
ISAKMP: default group 2
ISAKMP: auth RSA sig
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x0 0x70 0x80
ISAKMP (0): atts are not acceptable. Next payload is 3
ISAKMP (0): Checking ISAKMP transform 3 against priority 20 policy
ISAKMP: encryption DES-CBC
ISAKMP: hash SHA
ISAKMP: default group 1
ISAKMP: auth RSA sig
ISAKMP: life type in seconds
ISAKMP: life duration (VPI) of 0x0 0x0 0x70 0x80
ISAKMP (0): atts are acceptable. Next payload is 3
ISAKMP (0): processing vendor id payload
ISAKMP (0): speaking to a MSWIN2K client
ISAKMP (0): SA is doing RSA signature authentication using id type ID_FQ
return status is IKMP_NO_ERROR
crypto_isakmp_process_block: src 216.254.67.200, dest 63.92.151.130
OAK_MM exchange
ISAKMP (0): processing KE payload. message ID = 0
ISAKMP (0): processing NONCE payload. message ID = 0
return status is IKMP_NO_ERROR
crypto_isakmp_process_block: src 216.254.67.200, dest 63.92.151.130
OAK_MM exchange
ISAKMP (0): processing ID payload. message ID = 0
ISAKMP (0): processing CERT payload. message ID = 0
ISAKMP (0): processing a CT_X509_SIGNATURE cert
ISAKMP (0): Unknown error in cert validation, 65535
return status is IKMP_ERR_RETRANS
crypto_isakmp_process_block: src 216.254.67.200, dest 63.92.151.130
OAK_MM exchange
ISAKMP (0): processing ID payload. message ID = 0
ISAKMP (0): processing CERT payload. message ID = 0
ISAKMP (0): processing a CT_X509_SIGNATURE cert
ISAKMP (0): Unknown error in cert validation, 65535
return status is IKMP_ERR_RETRANS
crypto_isakmp_process_block: src 216.254.67.200, dest 63.92.151.130
OAK_MM exchange
ISAKMP (0): processing ID payload. message ID = 0
ISAKMP (0): processing CERT payload. message ID = 0
ISAKMP (0): processing a CT_X509_SIGNATURE cert
ISAKMP (0): Unknown error in cert validation, 65535
return status is IKMP_ERR_RETRANS
crypto_isakmp_process_block: src 216.254.67.200, dest 63.92.151.130
OAK_MM exchange
ISAKMP (0): processing ID payload. message ID = 0
ISAKMP (0): processing CERT payload. message ID = 0
ISAKMP (0): processing a CT_X509_SIGNATURE cert
ISAKMP (0): Unknown error in cert validation, 65535
return status is IKMP_ERR_RETRANS
crypto_isakmp_process_block: src 216.254.67.200, dest 63.92.151.130
Here is my configuration in PIX
ca identity ktivpn 10.10.10.10:/certsrv/mscep/mscep.dll
ca configure ktivpn ra 1 20 crloptional
isakmp policy 8 authentication rsa-sig
isakmp policy 8 encryption des
isakmp policy 8 hash md5
isakmp policy 8 group 1
isakmp policy 8 lifetime 86400
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
isakmp policy 20 authentication rsa-sig
isakmp policy 20 encryption des
isakmp policy 20 hash sha
isakmp policy 20 group 1
isakmp policy 20 lifetime 86400
crypto ipsec transform-set basic esp-des esp-sha-hmac
crypto ipsec transform-set myset esp-des esp-sha-hmac
crypto ipsec transform-set l2tp esp-des esp-sha-hmac
crypto ipsec transform-set l2tp mode transport
crypto ipsec transform-set ciscoclient esp-des esp-md5-hmac
crypto ipsec transform-set ciscoclientRSA esp-des esp-sha-hmac
crypto ipsec security-association lifetime seconds 3600
crypto dynamic-map dyna 4 set transform-set ciscoclientRSA
crypto dynamic-map dyna 10 set transform-set ciscoclient
crypto dynamic-map dyna 20 match address l2tp
crypto dynamic-map dyna 20 set transform-set l2tp
crypto dynamic-map dyna 20 set security-association lifetime seconds 28800 kilob
ytes 4608000
crypto map mymap 10 ipsec-isakmp dynamic dyna
crypto map mymap interface outside
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication pap
vpdn group 1 ppp authentication chap
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe 40
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 client configuration dns 192.168.10.2 192.168.10.3
vpdn group 1 client configuration wins 192.168.10.2
vpdn group 1 client authentication aaa AuthInbound
vpdn group 1 pptp echo 60
vpdn group 2 accept dialin l2tp
vpdn group 2 ppp authentication pap
vpdn group 2 ppp authentication chap
vpdn group 2 ppp authentication mschap
vpdn group 2 client configuration address local kti-pool
vpdn group 2 client configuration dns 192.168.10.2 192.168.10.3
vpdn group 2 client configuration wins 192.168.10.2
vpdn group 2 client authentication aaa AuthInbound
vpdn group 2 l2tp tunnel hello 60
vpdn group l2tpipsec accept dialin l2tp
vpdn group l2tpipsec ppp authentication pap
vpdn group l2tpipsec ppp authentication chap
vpdn group l2tpipsec ppp authentication mschap
vpdn group l2tpipsec client configuration address local l2tp
vpdn group l2tpipsec l2tp tunnel hello 60
vpdn username cisco password cisco
vpdn enable outside
09-05-2001 07:05 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide