Question : Problem: Pix to Netscreen VPN

I am working on getting a PIX515 to connect to a Netscreen 5GT

In my lab I have a PIX 501 running 6.3(4).  I can connect to my 5GT without any problems

When I do a get sa from the Netscreen I get

0000000a<     6*.*.*.*  500 esp:3des/md5  2695cc0c 28610  403M A/-    -1 0
0000000a>     6*.*.*.*  500 esp:3des/md5  e614d74c 28610  403M A/-    -1 0

When i try and connect to my 515 in production running 6.3(1) it wont connect and I get the following


0000000a<    6*.*.*.*  500 esp:3des/md5  00000000 expir unlim I/I    -1 0
0000000a>    6*.*.*.*  500 esp:3des/md5  00000000 expir unlim I/I    -1 0

Here is the error in the logs
2006-12-20 08:06:21 info IKE: Removed Phase 2 SAs after receiving a notification message.
2006-12-20 08:06:21 info IKE<*.*.*.*>: Received a notification message for DOI <1> <14> .
2006-12-20 08:06:21 info IKE<*.*.*.*> Phase 2: Initiated negotiations.


here are the relvant portions of the configs

set ike p1-proposal "toPIX" preshare group2 esp 3des md5 second 86400
set ike p2-proposal "toPIX" group2 esp 3des md5 second 3600
set vpn "VPN" gateway "GW" no-replay tunnel idletime 0 proposal "g2-esp-3des-md5"
set vpn "VPN" id 10 bind interface tunnel.1
set vpn "VPN" proxy-id local-ip 172.16.10.0/24 remote-ip 172.16.0.0/24 "ANY"

Here is the config that isnt working

crypto ipsec transform-set caset esp-3des esp-md5-hmac
crypto map newmap 20 ipsec-isakmp dynamic camap
crypto map newmap 200 ipsec-isakmp
crypto map newmap 200 match address 200
crypto map newmap 200 set peer *.*.*.*
crypto map newmap 200 set transform-set caset
crypto map newmap interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400


Here is the config that is working

crypto ipsec transform-set esp-3des-md5 esp-3des esp-md5-hmac
crypto map outside_map 30 ipsec-isakmp
crypto map outside_map 30 match address vpn
crypto map outside_map 30 set peer *.*.*.*
crypto map outside_map 30 set transform-set esp-3des-md5
crypto map outside_map interface outside
isakmp enable outside
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400

Answer : Problem: Pix to Netscreen VPN

>my 515 in production running 6.3(1)
Very buggy version of Pix code. Suggest updating to 6.3(5)

>crypto map newmap 20 ipsec-isakmp dynamic camap
This is the difference between the set that works and the one that does not.
The dynamic entry (20 here) should be higher than all the statics.
Try:
 crypto map newmap 200 set peer *.*.*.*
 crypto map newmap 2000 ipsec-isakmp dynamic camap

Random Solutions  
 
programming4us programming4us