This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Astaro ASG to Cisco Pix

Has anyone had success in integrating these two with the following parameters?

IKE encryption: 3DES
IKE authentication: MD5
IKE Lifetime SA: 86400
IKE DH Group: Group 1

IPSEC encryption: 3DES
IPSEC authentication: MD5
IPSEC SA Lifetime: 3600
IPSEC DH Group: None

Please share your experience and Cisco config files. Or if you think there is something wrong with this parameter please let me know. I keep getting NO_PROPOSAL_CHOSEN errors from the Cisco unit. 
The pre-shared key is correct so I am not sure if there is anything else I need to do.


Thanks.


This thread was automatically locked due to age.
Parents Reply Children
  • Not yet.

    My understanding is the site-to-site VPNs in 7.x are similar to 6.x, with minor tweaks (such as fixing the automatic reconnects if a key is used for multiple tunnels).

    7.x does radically change the remote access VPNs, though, using OpenSSL VPN tunnels, I believe.

    Barry
  • My experience with converting V6 customers over to V7 with site to site VPNs (between ASGs and other miscellaneous VPN hardware) has been relatively troublefree.

    While Astaro has added the option to use a SSL VPN for remote "road warrior" users, the ability to configure "road warrior" IPSEC VPN users as well... they didn't eliminate that option.

    CTO, Convergent Information Security Solutions, LLC

    https://www.convergesecurity.com

    Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries.  Use the advice given at your own risk.