Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

Cisco Secure client to 3620 IPSec

I configured IPSec and ISAKMP on the 3620 using a dynamic map. I configure the pre-shared key with the following command:

"crypto isakmp key ciscocisco address 0.0.0.0"

but it would not work until I specified a specific IP address:

"crypto isakmp key ciscocisco address 192.168.1.14"

I am running IOS version 12.0 on the 3620 and Cisco Secure Client 1.1. Is this an IOS bug or did I configure something incorrectly.

Bruce Williams

mailto:bruce.lawrence.williams@verizon.com

1 REPLY
New Member

Re: Cisco Secure client to 3620 IPSec

I think that you've missed out the wildcard mask of 0.0.0.0 which tells the router that you are using dynamic addressing for the clients. Try adding an extra 0.0.0.0 to the end of your crypto isakmp key command...

Here's a section from my own...

crypto isakmp policy 1

hash md5

authentication pre-share

crypto isakmp key ****** address 0.0.0.0 0.0.0.0

crypto isakmp client configuration address-pool local vpnpool

!

!

crypto ipsec transform-set trans1 esp-des esp-md5-hmac

!

crypto dynamic-map dynmap 10

set transform-set trans1

!

!

crypto map intmap client configuration address initiate

crypto map intmap client configuration address respond

crypto map intmap 10 ipsec-isakmp dynamic dynmap

- Colin -

91
Views
0
Helpful
1
Replies