<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MSR2003 and IKEv2 in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109501#M34417</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;From the windows client configuration I can see its using GCMAES256 while the HPE device is using CBCAES256 due which there is a mismatch in proposal. I will suggest to change the windows client to use CBC-AES-256 and check if it works. If CBC is not applicable on windows client then you can try with below any other cipher suites&lt;/P&gt;&lt;P&gt;3des-cbc 168-bit CBC mode 3DES&lt;BR /&gt;aes-cbc-128 128-bit CBC mode AES&lt;BR /&gt;aes-cbc-192 192-bit CBC mode AES&lt;BR /&gt;aes-cbc-256 256-bit CBC mode AES&lt;BR /&gt;aes-ctr-128 128-bit CTR mode AES&lt;BR /&gt;aes-ctr-192 192-bit CTR mode AES&lt;BR /&gt;aes-ctr-256 256-bit CTR mode AES&lt;BR /&gt;camellia-cbc-128 128-bit CBC mode Camellia&lt;BR /&gt;camellia-cbc-192 192-bit CBC mode Camellia&lt;BR /&gt;camellia-cbc-256 256-bit CBC mode Camellia&lt;BR /&gt;des-cbc 56-bit CBC mode DES&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Windows Client Proposal -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AuthenticationTransformConstants : GCMAES256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CipherTransformConstants : GCMAES256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;DHGroup : Group14&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IntegrityCheckMethod : SHA1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;PfsGroup : PFS2048&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;EncryptionMethod : GCMAES256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;HPE Router Proposal -&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;esp encryption-algorithm aes-cbc-256&lt;BR /&gt;esp authentication-algorithm sha1&lt;/P&gt;&lt;P&gt;-N&lt;/P&gt;</description>
    <pubDate>Wed, 18 Nov 2020 05:42:57 GMT</pubDate>
    <dc:creator>Nitish_N</dc:creator>
    <dc:date>2020-11-18T05:42:57Z</dc:date>
    <item>
      <title>MSR2003 and IKEv2</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7108949#M34407</link>
      <description>&lt;P&gt;Hello, community!&lt;/P&gt;&lt;P&gt;I try to set up HPE MSR2003 router with host-to-site configuration, and I have a trouble with IKE. At &lt;A href="https://support.hpe.com/hpesc/public/docDisplay?docId=c05031616" target="_blank" rel="noopener"&gt;HPE FlexNetwork MSR Router Servies Comware 7 Security Configuration Guide&lt;/A&gt; on 438 page placed IKE local extended authentication and adress pool authorization configuration example.&lt;/P&gt;&lt;P&gt;I adapt it for my network comfiguration and take error 13868 "Policy match error" at Windows 10 Client.&lt;/P&gt;&lt;P&gt;Please, give me advice: there I have mistake, at router config or this is Windows problem? Which direction I need continue investigation for resolve this issue?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Network config.png" style="width: 372px;"&gt;&lt;img src="https://community.hpe.com/t5/image/serverpage/image-id/119721iA68EE6DF3E5CA40B/image-size/large?v=v2&amp;amp;px=2000" role="button" title="Network config.png" alt="Network config.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;LI-SPOILER&gt;&amp;lt;HPE&amp;gt;display current-configuration&lt;BR /&gt;#&lt;BR /&gt;version 7.1.059, Release 0306P30&lt;BR /&gt;#&lt;BR /&gt;sysname HPE&lt;BR /&gt;#&lt;BR /&gt;password-recovery enable&lt;BR /&gt;#&lt;BR /&gt;vlan 1&lt;BR /&gt;#&lt;BR /&gt;controller Cellular0/0&lt;BR /&gt;#&lt;BR /&gt;interface Aux0&lt;BR /&gt;#&lt;BR /&gt;interface NULL0&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;ip address dhcp-alloc&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;port link-mode route&lt;BR /&gt;ip address 31.X.Y.78 255.255.255.252&lt;BR /&gt;ipsec apply policy map1&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet2/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;ip address 172.17.77.1 255.255.255.0&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet2/1&lt;BR /&gt;port link-mode bridge&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet2/2&lt;BR /&gt;port link-mode bridge&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet2/3&lt;BR /&gt;port link-mode bridge&lt;BR /&gt;#&lt;BR /&gt;scheduler logfile size 16&lt;BR /&gt;#&lt;BR /&gt;line class aux&lt;BR /&gt;user-role network-admin&lt;BR /&gt;#&lt;BR /&gt;line class tty&lt;BR /&gt;user-role network-operator&lt;BR /&gt;#&lt;BR /&gt;line class vty&lt;BR /&gt;user-role network-operator&lt;BR /&gt;#&lt;BR /&gt;line aux 0&lt;BR /&gt;user-role network-admin&lt;BR /&gt;#&lt;BR /&gt;line vty 0 63&lt;BR /&gt;user-role network-operator&lt;BR /&gt;#&lt;BR /&gt;ip route-static 0.0.0.0 0 31.X.Y.77&lt;BR /&gt;#&lt;BR /&gt;domain dm&lt;BR /&gt;authentication ike local&lt;BR /&gt;authorization ike local&lt;BR /&gt;#&lt;BR /&gt;domain system&lt;BR /&gt;#&lt;BR /&gt;domain default enable system&lt;BR /&gt;#&lt;BR /&gt;role name level-0&lt;BR /&gt;description Predefined level-0 role&lt;BR /&gt;#&lt;BR /&gt;role name level-1&lt;BR /&gt;description Predefined level-1 role&lt;BR /&gt;#&lt;BR /&gt;role name level-2&lt;BR /&gt;description Predefined level-2 role&lt;BR /&gt;#&lt;BR /&gt;role name level-3&lt;BR /&gt;description Predefined level-3 role&lt;BR /&gt;#&lt;BR /&gt;role name level-4&lt;BR /&gt;description Predefined level-4 role&lt;BR /&gt;#&lt;BR /&gt;role name level-5&lt;BR /&gt;description Predefined level-5 role&lt;BR /&gt;#&lt;BR /&gt;role name level-6&lt;BR /&gt;description Predefined level-6 role&lt;BR /&gt;#&lt;BR /&gt;role name level-7&lt;BR /&gt;description Predefined level-7 role&lt;BR /&gt;#&lt;BR /&gt;role name level-8&lt;BR /&gt;description Predefined level-8 role&lt;BR /&gt;#&lt;BR /&gt;role name level-9&lt;BR /&gt;description Predefined level-9 role&lt;BR /&gt;#&lt;BR /&gt;role name level-10&lt;BR /&gt;description Predefined level-10 role&lt;BR /&gt;#&lt;BR /&gt;role name level-11&lt;BR /&gt;description Predefined level-11 role&lt;BR /&gt;#&lt;BR /&gt;role name level-12&lt;BR /&gt;description Predefined level-12 role&lt;BR /&gt;#&lt;BR /&gt;role name level-13&lt;BR /&gt;description Predefined level-13 role&lt;BR /&gt;#&lt;BR /&gt;role name level-14&lt;BR /&gt;description Predefined level-14 role&lt;BR /&gt;#&lt;BR /&gt;user-group system&lt;BR /&gt;#&lt;BR /&gt;local-user ike class network&lt;BR /&gt;service-type ike&lt;BR /&gt;authorization-attribute user-role network-operator&lt;BR /&gt;authorization-attribute ip-pool pool&lt;BR /&gt;#&lt;BR /&gt;local-user test class network&lt;BR /&gt;password cipher $c$uvw==&lt;BR /&gt;service-type ike&lt;BR /&gt;authorization-attribute user-role network-operator&lt;BR /&gt;#&lt;BR /&gt;cwmp&lt;BR /&gt;cwmp enable&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set tran1&lt;BR /&gt;encapsulation-mode transport&lt;BR /&gt;esp encryption-algorithm aes-cbc-256&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;#&lt;BR /&gt;ipsec policy-template pt 1&lt;BR /&gt;transform-set tran1&lt;BR /&gt;ike-profile profile1&lt;BR /&gt;reverse-route dynamic&lt;BR /&gt;#&lt;BR /&gt;ipsec policy map1 1 isakmp template pt&lt;BR /&gt;#&lt;BR /&gt;ike address-group pool 172.20.33.1 172.20.33.100 255.255.255.255&lt;BR /&gt;#&lt;BR /&gt;ike profile profile1&lt;BR /&gt;keychain keychanin1&lt;BR /&gt;local-identity address 31.X.Y.78&lt;BR /&gt;match remote identity address 92.43.XX.YY 255.255.255.0&lt;BR /&gt;client-authentication xauth&lt;BR /&gt;aaa authorization domain dm username ike&lt;BR /&gt;#&lt;BR /&gt;ike keychain keychain1&lt;BR /&gt;pre-shared-key address 172.20.33.1 255.255.255.255 key cipher $c$3vWU=&lt;BR /&gt;#&lt;BR /&gt;return&lt;/LI-SPOILER&gt;</description>
      <pubDate>Thu, 12 Nov 2020 15:15:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7108949#M34407</guid>
      <dc:creator>Abiboss</dc:creator>
      <dc:date>2020-11-12T15:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: MSR2003 and IKEv2</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109018#M34408</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please check if the policy configured on HPE device and client trying to negotiate the policy are same. If not same or configured then we generally face the issue.&lt;/P&gt;&lt;P&gt;-N&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2020 05:43:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109018#M34408</guid>
      <dc:creator>Nitish_N</dc:creator>
      <dc:date>2020-11-13T05:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: MSR2003 and IKEv2</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109244#M34410</link>
      <description>&lt;P&gt;Maybe I got wrong example of configuration?&lt;/P&gt;&lt;P&gt;Here is it:&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;# Configure IP addresses for interfaces. (Details not shown.)&lt;/P&gt;&lt;P&gt;Interface GigabitEthernet2/0&lt;/P&gt;&lt;P&gt;Port link-mode route&lt;/P&gt;&lt;P&gt;Ip address 172.17.77.1 255.255.255.0&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;Port link-mode route&lt;/P&gt;&lt;P&gt;Ip address 31.X.Y.78 255.255.255.252&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# route to ISP&lt;/P&gt;&lt;P&gt;ip route-static 0.0.0.0 0.0.0.0 31.X.Y.77&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# Create an ISP domain named dm.&lt;/P&gt;&lt;P&gt;&amp;lt;Device&amp;gt; system-view&lt;/P&gt;&lt;P&gt;[Device] domain dm&lt;/P&gt;&lt;P&gt;# Configure the device to perform IKE local authentication.&lt;/P&gt;&lt;P&gt;[Device-isp-dm] authentication ike local&lt;/P&gt;&lt;P&gt;# Configure the device to perform IKE local authorization.&lt;/P&gt;&lt;P&gt;[Device-isp-dm] authorization ike local&lt;/P&gt;&lt;P&gt;[Device-isp-dm] quit&lt;/P&gt;&lt;P&gt;# Create an IKE IPv4 address pool named pool with an IPv4 address range of 172.20.33.1 to 172.20.33.100.&lt;/P&gt;&lt;P&gt;[Device] ike address-group pool 172.20.33.1 172.20.33.100&lt;/P&gt;&lt;P&gt;# Add a network user named ike.&lt;/P&gt;&lt;P&gt;[Device] local-user ike class network&lt;/P&gt;&lt;P&gt;# Authorize user ike to use the IKE service.&lt;/P&gt;&lt;P&gt;[Device-luser-network-ike] service-type ike&lt;/P&gt;&lt;P&gt;# Specify IPv4 address pool pool as the authorized IPv4 address pool for user ike.&lt;/P&gt;&lt;P&gt;[Device-luser-network-ike] authorization-attribute ip-pool pool&lt;/P&gt;&lt;P&gt;[Device-luser-network-ike] quit&lt;/P&gt;&lt;P&gt;# Add a network user named test.&lt;/P&gt;&lt;P&gt;[Device] local-user test class network&lt;/P&gt;&lt;P&gt;# Authorize user test to use the IKE service.&lt;/P&gt;&lt;P&gt;[Device-luser-network-test] service-type ike&lt;/P&gt;&lt;P&gt;# Configure a password for user test.&lt;/P&gt;&lt;P&gt;[Device-luser-network-test] password simple abc&lt;/P&gt;&lt;P&gt;[Device-luser-network-test] quit&lt;/P&gt;&lt;P&gt;# Create an IKE keychain named keychain1.&lt;/P&gt;&lt;P&gt;[Device] ike keychain keychain1&lt;/P&gt;&lt;P&gt;# Set the preshared key used for IKE negotiation with the remote peer at 1.1.1.1.&lt;/P&gt;&lt;P&gt;[Device-ike-keychain-keychain1] pre-shared-key address 172.20.XX.YY 255.255.255.255 key simple 123456TESTplat&amp;amp;!&lt;/P&gt;&lt;P&gt;[Device-ike-keychain-keychain1] quit&lt;/P&gt;&lt;P&gt;# Create an IKE profile named profile1.&lt;/P&gt;&lt;P&gt;[Device] ike profile profile1&lt;/P&gt;&lt;P&gt;# Specify IKE keychain keychain1 for IKE profile profile1.&lt;/P&gt;&lt;P&gt;[Device-ike-profile-profile1] keychain keychain1&lt;/P&gt;&lt;P&gt;# Specify IP address 2.2.2.2 as the local ID.&lt;/P&gt;&lt;P&gt;[Device-ike-profile-profile1] local-identity address 31.X.Y.78&lt;/P&gt;&lt;P&gt;# Configure the peer ID for IKE profile matching.&lt;/P&gt;&lt;P&gt;[Device-ike-profile-profile1] match remote identity address &lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;92.43.XXX.YYY 255.255.255.0&lt;/P&gt;&lt;P&gt;# Enable XAUTH authentication for clients.&lt;/P&gt;&lt;P&gt;[Device-ike-profile-profile1] client-authentication xauth&lt;/P&gt;&lt;P&gt;# Enable AAA authorization. Specify ISP domain dm and username ike.&lt;/P&gt;&lt;P&gt;[Device-ike-profile-profile1] aaa authorization domain dm username ike&lt;/P&gt;&lt;P&gt;[Device-ike-profile-profile1] quit&lt;/P&gt;&lt;P&gt;# Created an IPsec transform set named tran1.&lt;/P&gt;&lt;P&gt;[Device] ipsec transform-set tran1&lt;/P&gt;&lt;P&gt;# Specify the transport encapsulation mode.&lt;/P&gt;&lt;P&gt;[Device-ipsec-transform-set-tran1] encapsulation-mode transport&lt;/P&gt;&lt;P&gt;# Specify the ESP security protocol.&lt;/P&gt;&lt;P&gt;[Device-ipsec-transform-set-tran1] protocol esp&lt;/P&gt;&lt;P&gt;# Specify the ESP authentication algorithm and encryption algorithm.&lt;/P&gt;&lt;P&gt;[Device-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-256&lt;/P&gt;&lt;P&gt;[Device-ipsec-transform-set-tran1] esp authentication-algorithm sha1&lt;/P&gt;&lt;P&gt;[Device-ipsec-transform-set-tran1] quit&lt;/P&gt;&lt;P&gt;# Create an IPsec policy template entry. Specify the template name as pt and set the sequence number to 1.&lt;/P&gt;&lt;P&gt;[Device] ipsec policy-template pt 1&lt;/P&gt;&lt;P&gt;# Specify IPsec transform set tran1.&lt;/P&gt;&lt;P&gt;[Device-ipsec-policy-template-pt-1] transform-set tran1&lt;/P&gt;&lt;P&gt;# Specify IKE profile profile1.&lt;/P&gt;&lt;P&gt;[Device-ipsec-policy-template-pt-1] ike-profile profile1&lt;/P&gt;&lt;P&gt;# Enable IPsec RRI.&lt;/P&gt;&lt;P&gt;[Device-ipsec-policy-template-pt-1] reverse-route dynamic&lt;/P&gt;&lt;P&gt;[Device-ipsec-policy-template-pt-1] quit&lt;/P&gt;&lt;P&gt;# Use IPsec policy template pt to create an IKE-based IPsec policy entry. Specify the policy name as map1 and set the sequence number to 1.&lt;/P&gt;&lt;P&gt;[Device] ipsec policy map1 1 isakmp template pt&lt;/P&gt;&lt;P&gt;# Apply the IPsec policy to GigabitEthernet 0/1.&lt;/P&gt;&lt;P&gt;[Device] interface gigabitethernet 0/1&lt;/P&gt;&lt;P&gt;[Device-GigabitEthernet1/0/1] ipsec apply policy map1&lt;/P&gt;&lt;P&gt;[Device-GigabitEthernet1/0/1] quit&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;As I uderstood, here is two settings of crypto policy:&lt;/P&gt;&lt;P&gt;esp encryption-algorithm aes-cbc-256&lt;/P&gt;&lt;P&gt;esp authentication-algorithm sha1&lt;/P&gt;&lt;P&gt;Maybe default Windows settings for IKE tunnel not &lt;SPAN class="VIiyi"&gt;&lt;SPAN class="JLqJ4b ChMk0b"&gt;&lt;SPAN&gt;suitable&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; for HPE routers and need addition settings? Via PowerShell I did this settings:&lt;/P&gt;&lt;P&gt;AuthenticationTransformConstants : GCMAES256&lt;BR /&gt;CipherTransformConstants : GCMAES256&lt;BR /&gt;DHGroup : Group14&lt;BR /&gt;IntegrityCheckMethod : SHA1&lt;BR /&gt;PfsGroup : PFS2048&lt;BR /&gt;EncryptionMethod : GCMAES256&lt;/P&gt;&lt;P&gt;But nothing changed.&lt;/P&gt;&lt;P&gt;I also include this parameters in Windows Registry:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Windows Registry Editor Version 5.00&lt;/P&gt;&lt;P&gt;[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters]&lt;BR /&gt;"NegotiateDH2048_AES256"=dword:00000002&lt;BR /&gt;"DisableIKENameEkuCheck"=dword:00000001&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Sorry for my newbie questions, this is my first HPE router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Nov 2020 12:20:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109244#M34410</guid>
      <dc:creator>Abiboss</dc:creator>
      <dc:date>2020-11-16T12:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: MSR2003 and IKEv2</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109262#M34411</link>
      <description>&lt;P&gt;I scanned the connection with the Wireshark and found the message No proposal chosen.&lt;/P&gt;&lt;P&gt;But what parameters should be set in Windows?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="isakmp.png" style="width: 1093px;"&gt;&lt;img src="https://community.hpe.com/t5/image/serverpage/image-id/119805i45A0B25C8F6D5DE7/image-size/large?v=v2&amp;amp;px=2000" role="button" title="isakmp.png" alt="isakmp.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Nov 2020 15:18:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109262#M34411</guid>
      <dc:creator>Abiboss</dc:creator>
      <dc:date>2020-11-16T15:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: MSR2003 and IKEv2</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109501#M34417</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;From the windows client configuration I can see its using GCMAES256 while the HPE device is using CBCAES256 due which there is a mismatch in proposal. I will suggest to change the windows client to use CBC-AES-256 and check if it works. If CBC is not applicable on windows client then you can try with below any other cipher suites&lt;/P&gt;&lt;P&gt;3des-cbc 168-bit CBC mode 3DES&lt;BR /&gt;aes-cbc-128 128-bit CBC mode AES&lt;BR /&gt;aes-cbc-192 192-bit CBC mode AES&lt;BR /&gt;aes-cbc-256 256-bit CBC mode AES&lt;BR /&gt;aes-ctr-128 128-bit CTR mode AES&lt;BR /&gt;aes-ctr-192 192-bit CTR mode AES&lt;BR /&gt;aes-ctr-256 256-bit CTR mode AES&lt;BR /&gt;camellia-cbc-128 128-bit CBC mode Camellia&lt;BR /&gt;camellia-cbc-192 192-bit CBC mode Camellia&lt;BR /&gt;camellia-cbc-256 256-bit CBC mode Camellia&lt;BR /&gt;des-cbc 56-bit CBC mode DES&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Windows Client Proposal -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AuthenticationTransformConstants : GCMAES256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CipherTransformConstants : GCMAES256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;DHGroup : Group14&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IntegrityCheckMethod : SHA1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;PfsGroup : PFS2048&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;EncryptionMethod : GCMAES256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;HPE Router Proposal -&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;esp encryption-algorithm aes-cbc-256&lt;BR /&gt;esp authentication-algorithm sha1&lt;/P&gt;&lt;P&gt;-N&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2020 05:42:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109501#M34417</guid>
      <dc:creator>Nitish_N</dc:creator>
      <dc:date>2020-11-18T05:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: MSR2003 and IKEv2</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109959#M34420</link>
      <description>&lt;P&gt;Thanks for answer!&lt;/P&gt;&lt;P&gt;As I understood, Windows 10 20H2 supports next algorithm:&lt;/P&gt;&lt;P&gt;AuthenticationTransformConstants: GCMAES256 (MD596, SHA196, SHA256128, GCMAES128, GCMAES192, GCMAES256, None)&lt;BR /&gt;CipherTransformConstants: GCMAES256 (DES, DES3, AES128, AES192, AES256, GCMAES128, GCMAES192, GCMAES256, None)&lt;BR /&gt;EncryptionMethod: GCMAES256 (GCMAES128, GCMAES192, GCMAES256)&lt;BR /&gt;IntegrityCheckMethod: SHA384 (MD5, SHA1, SHA256, SHA384)&lt;BR /&gt;PfsGroup: PFS2048 (None, PFS1, PFS2, PFS2048, ECP256, ECP384, PFSMM, PFS24)&lt;BR /&gt;DHGroup: Group14 (None, Group1, Group2, Group14, ECP256, ECP384, Group24)&lt;/P&gt;&lt;P&gt;&lt;SPAN class="VIiyi"&gt;&lt;SPAN class="JLqJ4b ChMk0b"&gt;&lt;SPAN&gt;So Windows 10 version 20H2 supports only GCMAES128, GCMAES192, GCMAES256 encryption methods, as I understood HPE doesn't support this connection type.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 09:45:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7109959#M34420</guid>
      <dc:creator>Abiboss</dc:creator>
      <dc:date>2020-11-20T09:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: MSR2003 and IKEv2</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7110191#M34421</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Below are the supported cipher from HPE Device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For IPSEC transform set, HPE supports below encryption&amp;nbsp;&lt;/P&gt;&lt;P&gt;[MSR-ipsec-transform-set-test]esp encryption-algorithm ?&lt;BR /&gt;3des-cbc 168-bit CBC mode 3DES&lt;BR /&gt;aes-cbc-128 128-bit CBC mode Advanced Encryption Standard (AES)&lt;BR /&gt;aes-cbc-192 192-bit CBC mode AES&lt;BR /&gt;aes-cbc-256 256-bit CBC mode AES&lt;BR /&gt;aes-ctr-128 Use 128-bit AES-CTR&lt;BR /&gt;aes-ctr-192 Use 192-bit AES-CTR&lt;BR /&gt;aes-ctr-256 Use 256-bit AES-CTR&lt;BR /&gt;camellia-cbc-128 Use 128-bit CAMELLIA-CBC&lt;BR /&gt;camellia-cbc-192 Use 192-bit CAMELLIA-CBC&lt;BR /&gt;camellia-cbc-256 Use 256-bit CAMELLIA-CBC&lt;BR /&gt;des-cbc 56-bit CBC mode Data Encryption Standard (DES)&lt;BR /&gt;gmac-128 Use 128-bit GMAC&lt;BR /&gt;gmac-192 Use 192-bit GMAC&lt;BR /&gt;gmac-256 Use 256-bit GMAC&lt;BR /&gt;gcm-128 Use 128-bit GCM&lt;BR /&gt;gcm-192 Use 192-bit GCM&lt;BR /&gt;gcm-256 Use 256-bit GCM&lt;BR /&gt;null Use NULL&lt;/P&gt;&lt;P&gt;For IKEv2 Proposal, HPE supports below encryption&amp;nbsp;&lt;/P&gt;&lt;P&gt;[MSR-ikev2-proposal-test]encryption ?&lt;BR /&gt;3des-cbc 168-bit CBC mode 3DES&lt;BR /&gt;aes-cbc-128 128-bit CBC mode AES&lt;BR /&gt;aes-cbc-192 192-bit CBC mode AES&lt;BR /&gt;aes-cbc-256 256-bit CBC mode AES&lt;BR /&gt;aes-ctr-128 128-bit CTR mode AES&lt;BR /&gt;aes-ctr-192 192-bit CTR mode AES&lt;BR /&gt;aes-ctr-256 256-bit CTR mode AES&lt;BR /&gt;camellia-cbc-128 128-bit CBC mode Camellia&lt;BR /&gt;camellia-cbc-192 192-bit CBC mode Camellia&lt;BR /&gt;camellia-cbc-256 256-bit CBC mode Camellia&lt;BR /&gt;des-cbc 56-bit CBC mode DES&lt;/P&gt;&lt;P&gt;You may chose anyone one of them which is available in windows and also to inform IPSEC transform set and IKE Proposal are two different things so we have to make sure windows client is negotiating properly with correct proposal.&lt;/P&gt;&lt;P&gt;-N&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 01:57:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/msr2003-and-ikev2/m-p/7110191#M34421</guid>
      <dc:creator>Nitish_N</dc:creator>
      <dc:date>2020-11-23T01:57:13Z</dc:date>
    </item>
  </channel>
</rss>

