I learnt my lesson, guys, thanks a lot to everyone.
It was mostly because I was in the habit to trust what I remember from my real 
life experience and this made rely on the default ISAKMP policies.
There's a big difference in default ISAKMP policies on version 12.4(24) and 
12.4(15)

-====On 12.4(15)====-
R5#sh cry isa pol

Global IKE policy
Default protection suite
        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).
        hash algorithm:         Secure Hash Standard
        authentication method:  Rivest-Shamir-Adleman Signature
        Diffie-Hellman group:   #1 (768 bit)
        lifetime:               86400 seconds, no volume limit

-====On 12.4(24)====-
GIBSGW(config)#do sh cry isa pol

Default IKE policy
Protection suite of priority 65507
        encryption algorithm:   AES - Advanced Encryption Standard (128 bit 
keys).
        hash algorithm:         Secure Hash Standard
        authentication method:  Rivest-Shamir-Adleman Signature
        Diffie-Hellman group:   #5 (1536 bit)
        lifetime:               86400 seconds, no volume limit
Protection suite of priority 65508
        encryption algorithm:   AES - Advanced Encryption Standard (128 bit 
keys).
        hash algorithm:         Secure Hash Standard
        authentication method:  Pre-Shared Key
        Diffie-Hellman group:   #5 (1536 bit)
        lifetime:               86400 seconds, no volume limit
Protection suite of priority 65509
        encryption algorithm:   AES - Advanced Encryption Standard (128 bit 
keys).
        hash algorithm:         Message Digest 5
        authentication method:  Rivest-Shamir-Adleman Signature
        Diffie-Hellman group:   #5 (1536 bit)
        lifetime:               86400 seconds, no volume limit
Protection suite of priority 65510
        encryption algorithm:   AES - Advanced Encryption Standard (128 bit 
keys).
        hash algorithm:         Message Digest 5
        authentication method:  Pre-Shared Key
        Diffie-Hellman group:   #5 (1536 bit)
        lifetime:               86400 seconds, no volume limit
Protection suite of priority 65511
        encryption algorithm:   Three key triple DES
        hash algorithm:         Secure Hash Standard
        authentication method:  Rivest-Shamir-Adleman Signature
        Diffie-Hellman group:   #2 (1024 bit)
        lifetime:               86400 seconds, no volume limit
Protection suite of priority 65512
        encryption algorithm:   Three key triple DES
        hash algorithm:         Secure Hash Standard
        authentication method:  Pre-Shared Key
        Diffie-Hellman group:   #2 (1024 bit)
        lifetime:               86400 seconds, no volume limit
Protection suite of priority 65513
        encryption algorithm:   Three key triple DES
        hash algorithm:         Message Digest 5
        authentication method:  Rivest-Shamir-Adleman Signature
        Diffie-Hellman group:   #2 (1024 bit)
        lifetime:               86400 seconds, no volume limit
Protection suite of priority 65514
        encryption algorithm:   Three key triple DES
        hash algorithm:         Message Digest 5
        authentication method:  Pre-Shared Key
        Diffie-Hellman group:   #2 (1024 bit)
        lifetime:               86400 seconds, no volume limit


From: Alexei Monastyrnyi [mailto:[email protected]]
Sent: Saturday, August 04, 2012 8:38 PM
To: Eugene Pefti
Cc: [email protected]
Subject: Re: [OSL | CCIE_Security] EzVPN - once again

Eugene,
what is your exact configuration on EZ server and IOS remote sides?

If proposals are not accepted is what you see in debug crypto isakmp, then you 
need to see what exactly clients are sending for phase 1. The just add a policy 
matching it on server side.

As you know, if some lines are not shown in your policy-map configured, they 
are taking some default value.  To some extent the TAC engineer was right 
saying that client my not have exactly THAT set of proposals (havign a mix of 
default and non-default settings) which you have defined on your EZ server.

HTH
A.
On 8/5/2012 11:57 AM, Eugene Pefti wrote:
Have been beating my head over something trivial that drove me absolutely mad.
There's EzVPN server on the router. It was configured in classical crypto map 
mode and Dynamic VTI.
There are two EzVPN clients - Cisco software IPSec client and a router 
configured as EzVPN remote.
No matter what I did I ended up with "proposals not accepted" on phase 1 and 
"Processing of Aggressive mode failed with peer".
I use real gear and the amount of my frustration made me open the TAC case.
I couldn't believe my ears when the engineer said that my crypto isakmp policy 
was missing hash and encryption parameters when he saw only two lines:

crypto isakmp policy 10
  authentication pre-share

When I showed him the output of "show crypto isakmp policy" with a complete set 
of proposals he said that I still have to add different combinations of 
encryption and hash manually.
Then I was surprised when the software IPSec client finally connected was still 
able to connect over and over again.

So-o-o-o funny when the engineer said that I have to upgrade to the newer 
software which leaves me in doubt about version 12.4(15).
Do it next time if you have something similar.

Eugene






_______________________________________________

For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com<http://www.ipexpert.com>



Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com<http://www.PlatinumPlacement.com>

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to