Initiating aggressive mode with IPSec

Unanswered Question
Oct 16th, 2009
User Badges:

Hi all


With pre-shared key, if I need to initiate an aggressive site to site IPSec connection, I configure the following:


crypto isakmp peer hostname ciscoasa

set aggressive client-endpoint fqdn ciscoasa

set aggressive password cisco


But if I am going to use certificates with the following configuration, the tunnel doesn't comes up:


crypto isakmp peer hostname ciscoasa

set aggressive client-endpoint fqdn ciscoasa



Please let me know the necessary commands to initiate an IPSec site to site connection with digital certificates.


  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.

Actions

This Discussion