Initiating aggressive mode with IPSec

Unanswered Question
Oct 16th, 2009

Hi all

With pre-shared key, if I need to initiate an aggressive site to site IPSec connection, I configure the following:

crypto isakmp peer hostname ciscoasa

set aggressive client-endpoint fqdn ciscoasa

set aggressive password cisco

But if I am going to use certificates with the following configuration, the tunnel doesn't comes up:

crypto isakmp peer hostname ciscoasa

set aggressive client-endpoint fqdn ciscoasa

Please let me know the necessary commands to initiate an IPSec site to site connection with digital certificates.

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.

Actions

This Discussion