03-08-2011 06:22 AM
The bellow config is set up on my router, running 12.4. When the client initiates a connection the error states preshared authentication does not match the policy, which to me is clearly false. Any ideas?
Config:
aaa authentication login userauthen local
aaa authorization network groupauthor local
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
crypto isakmp client configuration group myvpn
key myVPN
domain mydomain.local
pool myvpnpool
crypto ipsec transform-set myvpnset esp-3des esp-sha-hmac
crypto dynamic-map dynmap 10
set transform-set myvpnset
crypto map clientmap client authentication list userauthen
crypto map clientmap isakmp authorization list groupauthor
crypto map clientmap client configuration address respond
crypto map clientmap 10 ipsec-isakmp dynamic dynmap
int fa0/0
crypto map clientmap
ip local pool myvpnpool 10.16.20.1 10.16.20.32
Error:
002474: *Mar 8 11:26:38.775 GMT: ISAKMP:(0):Checking ISAKMP transform 11 against priority 10 policy
002475: *Mar 8 11:26:38.775 GMT: ISAKMP: encryption 3DES-CBC
002476: *Mar 8 11:26:38.775 GMT: ISAKMP: hash SHA
002477: *Mar 8 11:26:38.775 GMT: ISAKMP: default group 2
002478: *Mar 8 11:26:38.775 GMT: ISAKMP: auth pre-share
002479: *Mar 8 11:26:38.775 GMT: ISAKMP: life type in seconds
002480: *Mar 8 11:26:38.775 GMT: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
002481: *Mar 8 11:26:38.775 GMT: ISAKMP:(0):Preshared authentication offered but does not match policy!
002482: *Mar 8 11:26:38.775 GMT: ISAKMP:(0):atts are not acceptable. Next payload is 3
03-09-2011 10:11 AM
"no crypto isakmp default policy" is supported since 12.4(20)T to disable the default isakmp suite.
To be honest, router should still use the configured policy first, as the default has the least priority. What exact IOS version you are running? Let us know if disabling the default policy work.
03-09-2011 10:14 AM
kaachary,
Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(15)T4, RELEASE SOFTWARE (fc2)
I just cant figure out why the router says preshared is not in the policy when it clearly is.
As you can see from the version I cannot disable default policy.
03-09-2011 10:47 AM
By any chance, you do not have this statement in the config?
crypto isakmp key
Since by default the IOS requires client to have xauth, so this no-xauth keyword will cause IOS not to accept the coinnection without xauth. Removing the statement or just the "no-xauth: keyword should work. But, if you you have dynamic L2L tunnel terminating on this router, they will fail. The correct way of configuring both is to use Iskamp profiles.
03-09-2011 10:56 AM
kaachary,
There is no other configuration with reference to isakmp other than the config shown in the initial post.
The only other crypto config is the following;
crypto pki trustpoint TP-self-signed-3282012444
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3282012444
revocation-check none
rsakeypair TP-self-signed-3282012444
!
!
crypto pki certificate chain TP-self-signed-3282012444
certificate self-signed 01
--- cert ---
quit
03-09-2011 11:03 AM
I see..I tried your configuration with the default policy in there, on 12.4.15T4, and it worked for me. So, it doesn't seem to be a software version issue. Have you tried reloading this router? Is it possible for you to attach the full configuration of the router after hiding the addresses?
03-09-2011 11:15 AM
kaachary,
The config is attached.
Connection is being tested from one of the internal networks so the firewall is out of the equation.
Obviously something is wrong with the pre-share, quesiton is what.
03-09-2011 11:17 AM
kaachary,
I have reloaded the router a few times, been at this for 2 days.
03-11-2011 07:20 AM
kaachary,
Any luck?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide