Hi all,
Related to a problem posted previously, I have reprogrammed a routers VPN settings, changing only the names of transform sets etc... Now our remote clients cannot connect:
Details as follows:
Old crypto configuration:
aaa authentication login userauthen local
aaa authorization network nclset local
crypto isakmp policy 20
hash md5
authentication pre-share
group 2
crypto isakmp keepalive 40 5
crypto isakmp nat keepalive 20
!
crypto isakmp client configuration group <omitted>
key <omitted>
pool nclvpn
!
!
crypto ipsec transform-set nclset esp-des esp-md5-hmac
crypto ipsec transform-set nclvpn esp-des esp-md5-hmac
!
crypto dynamic-map dynmap 1
set transform-set nclset
!
crypto map nclvpn client authentication list userauthen
crypto map nclvpn isakmp authorization list nclset
crypto map nclvpn client configuration address initiate
crypto map nclvpn client configuration address respond
crypto map nclvpn 20 ipsec-isakmp dynamic dynmap
interface Dialer1
description ADSL Internet Port
ip address <public IP address>
ip access-group 123 in
ip nat outside
encapsulation ppp
no ip route-cache same-interface
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap callin
ppp chap hostname <omitted>
ppp chap password <omitted>
crypto map nclvpn
ip local pool nclvpn 192.168.50.100 192.168.50.150
I changed this to the following:
aaa authentication login NCL_Authen local
aaa authorization network NCL_Author local
crypto isakmp client configuration group <omitted>
key <omitted>
pool VPN_IP_Pool
!
!
crypto ipsec transform-set NCL_Tran_Set esp-des esp-md5-hmac
!
crypto dynamic-map NCL_Dyn_Map 1
set transform-set NCL_Tran_Set
!
!
crypto map NCL_CMap client authentication list NCL_Authen
crypto map NCL_CMap isakmp authorization list NCL_Author
crypto map NCL_CMap client configuration address initiate
crypto map NCL_CMap client configuration address respond
crypto map NCL_CMap 20 ipsec-isakmp dynamic NCL_Dyn_Map
interface Dialer1
description ADSL Internet Port
ip address <public ip address>
ip access-group 123 in
ip nat outside
encapsulation ppp
no ip route-cache same-interface
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap callin
ppp chap hostname <omitted>
ppp chap password <omitted>
crypto map NCL_CMap
ip local pool VPN_IP_Pool 192.168.50.100 192.168.50.150
I have changed NONE of the incoming ACLs, NAT statements etc. The group authentication name under ISAKMP configuration is the same as is the pre-shared key entered by the clients. Below is part of a debug ISAKMP captured whilst a client is trying to connect... :
Nov 17 10:08:51.714: ISAKMP
0:1:HW:2):Checking ISAKMP transform 14 against priority 20 policy
Nov 17 10:08:51.714: ISAKMP: encryption DES-CBC
Nov 17 10:08:51.714: ISAKMP: hash MD5
Nov 17 10:08:51.714: ISAKMP: default group 2
Nov 17 10:08:51.714: ISAKMP: auth pre-share
Nov 17 10:08:51.714: ISAKMP: life type in seconds
Nov 17 10:08:51.714: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
Nov 17 10:08:51.714: ISAKMP
0:1:HW:2)
reshared authentication offered but does not match policy!
Nov 17 10:08:51.714: ISAKMP
0:1:HW:2):atts are not acceptable. Next payload is 0
Given that the settings for ISAKMP policy 20 (as per the config above) are as follows:
DES
MD5
Pre-share
DH group 2
Why is this not establishing an SA?
I have also reloaded the router and checked to make sure there is no residue configuration statements left over from when I reprogrammed it
Any help is vastly appreciated.. I need to get this working by close of play today
Many many thanks
Jim
CCNA
Related to a problem posted previously, I have reprogrammed a routers VPN settings, changing only the names of transform sets etc... Now our remote clients cannot connect:
Details as follows:
Old crypto configuration:
aaa authentication login userauthen local
aaa authorization network nclset local
crypto isakmp policy 20
hash md5
authentication pre-share
group 2
crypto isakmp keepalive 40 5
crypto isakmp nat keepalive 20
!
crypto isakmp client configuration group <omitted>
key <omitted>
pool nclvpn
!
!
crypto ipsec transform-set nclset esp-des esp-md5-hmac
crypto ipsec transform-set nclvpn esp-des esp-md5-hmac
!
crypto dynamic-map dynmap 1
set transform-set nclset
!
crypto map nclvpn client authentication list userauthen
crypto map nclvpn isakmp authorization list nclset
crypto map nclvpn client configuration address initiate
crypto map nclvpn client configuration address respond
crypto map nclvpn 20 ipsec-isakmp dynamic dynmap
interface Dialer1
description ADSL Internet Port
ip address <public IP address>
ip access-group 123 in
ip nat outside
encapsulation ppp
no ip route-cache same-interface
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap callin
ppp chap hostname <omitted>
ppp chap password <omitted>
crypto map nclvpn
ip local pool nclvpn 192.168.50.100 192.168.50.150
I changed this to the following:
aaa authentication login NCL_Authen local
aaa authorization network NCL_Author local
crypto isakmp client configuration group <omitted>
key <omitted>
pool VPN_IP_Pool
!
!
crypto ipsec transform-set NCL_Tran_Set esp-des esp-md5-hmac
!
crypto dynamic-map NCL_Dyn_Map 1
set transform-set NCL_Tran_Set
!
!
crypto map NCL_CMap client authentication list NCL_Authen
crypto map NCL_CMap isakmp authorization list NCL_Author
crypto map NCL_CMap client configuration address initiate
crypto map NCL_CMap client configuration address respond
crypto map NCL_CMap 20 ipsec-isakmp dynamic NCL_Dyn_Map
interface Dialer1
description ADSL Internet Port
ip address <public ip address>
ip access-group 123 in
ip nat outside
encapsulation ppp
no ip route-cache same-interface
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap callin
ppp chap hostname <omitted>
ppp chap password <omitted>
crypto map NCL_CMap
ip local pool VPN_IP_Pool 192.168.50.100 192.168.50.150
I have changed NONE of the incoming ACLs, NAT statements etc. The group authentication name under ISAKMP configuration is the same as is the pre-shared key entered by the clients. Below is part of a debug ISAKMP captured whilst a client is trying to connect... :
Nov 17 10:08:51.714: ISAKMP
Nov 17 10:08:51.714: ISAKMP: encryption DES-CBC
Nov 17 10:08:51.714: ISAKMP: hash MD5
Nov 17 10:08:51.714: ISAKMP: default group 2
Nov 17 10:08:51.714: ISAKMP: auth pre-share
Nov 17 10:08:51.714: ISAKMP: life type in seconds
Nov 17 10:08:51.714: ISAKMP: life duration (VPI) of 0x0 0x20 0xC4 0x9B
Nov 17 10:08:51.714: ISAKMP
Nov 17 10:08:51.714: ISAKMP
Given that the settings for ISAKMP policy 20 (as per the config above) are as follows:
DES
MD5
Pre-share
DH group 2
Why is this not establishing an SA?
I have also reloaded the router and checked to make sure there is no residue configuration statements left over from when I reprogrammed it
Any help is vastly appreciated.. I need to get this working by close of play today
Many many thanks
Jim
CCNA