Which step should you take next?

You are troubleshooting an IPsec VPN problem. During debugging of IPsec operations, you see
the message “attributes not acceptable” on the IKE responder after issuing the debug crypto
isakmp command. Which step should you take next?

You are troubleshooting an IPsec VPN problem. During debugging of IPsec operations, you see
the message “attributes not acceptable” on the IKE responder after issuing the debug crypto
isakmp command. Which step should you take next?

A.
verify matching ISAKMP policies on each peer

B.
verify that an IKE security association has been established between peers

C.
verify that IPsec transform sets match on each peer

D.
verify if default IPsec attributes are in place on each peer

Explanation:
The show crypto isakmp policy command can be executed on both peers to compare IKE
parameters and ensure that they match. The debug crypto isakmp debugging command will
display debugging messages during IKE negotiation and session establishment. These debugging
commands should be executed and analyzed on both peers.



Leave a Reply 0

Your email address will not be published. Required fields are marked *