ASA 5510 & Windows XP VPN Client

I want to use the VPN in Windows XP client to connect to the ASA

VPN access
.  I read the document after document, and I just can't get to work.  It seems what Phase 1 but I can't get the Phase 2.  In the logs ASDM, it shows that I get some QM WSF Errorsand on the Windows XP computer, I get an error 789.  I put the pre-shared on the XP machine as a result and another j.4 measures.

I am quite new to the method of L2TP VPN, I've always used Windows Server for the VPN and now I am to find out why.  In any case, I'm sure I'm missing some info that is needed to diagnose, but here's a copy of my config.

I hope someone can point me in the right direction to understand this because I am pulling my hair out!

Thanks in advance!

This set of transformation is fixed for the transport mode but not used.

Crypto ipsec transform-set esp-3des esp-sha-hmac TRANS_ESP_3DES_SHA ikev1
transport mode encryption ipsec transform-set TRANS_ESP_3DES_SHA ikev1

First, it must ensure that it is used in the list of games to turn in 'dynamic crypto-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set... ». L2TP/IPSec requires this mode.

If it still fails, try to get him debugs following during the connection to your customer.

Debug crypto isa 127

Debug crypto ipsec

Debug aaa 127 Commons

SPSP

Tags: Cisco Security

Similar Questions

  • Error of tunneling to ASA 5505 using "Software VPN Client"

    Here's my current network:

    I'm VPN tunnel in the ASA using the Cisco VPN Client software.

    Here is my config ASA config: http://pastebin.com/raw.php?i=ad6p1Zac

    Here's my entry for the VPN Client connection information:

    (Password: cisco)

    When I try to connect, I get the message error "the received HASH load cannot be verified.

    What is this error and how can I solve it?

    I think you need to enter this information in the fields of group authentiation:

    (Just below "Group authentication")

    Name: vpnclientgroup

    Password: [just what you entered as a pre shared key below]

    tunnel-group vpnclientgroup ipsec-attributes pre-shared-key *****

    After the establishmet tunnel you will get a password pop up, that you enter "David" and the associated password.

  • ASA problem inside the VPN client routing

    Hello

    I have a problem where I can't reach the VPN clients with their vpn IP pool from the inside or the asa itself. Connect VPN clients can access internal network very well. I have no nat configured for the pool of vpn and packet trace crypt packages and puts it into the tunnel. I'm not sure what's wrong.

    Here are a few relevant config:

    network object obj - 192.168.245.0

    192.168.245.0 subnet 255.255.255.0

    192.168.245.1 - 192.168.245.50 vpn IP local pool

    NAT (inside, outside) static source any any destination static obj - 192.168.245.0 obj - 192.168.245.0 no-proxy-arp-search to itinerary

    Out of Packet trace:

    Firewall # entry packet - trace inside the x.x.x.x icmp 8 0 192.168.245.33

    Phase: 1

    Type: ACCESS-LIST

    Subtype:

    Result: ALLOW

    Config:

    Implicit rule

    Additional information:

    MAC access list

    Phase: 2

    Type:-ROUTE SEARCH

    Subtype: entry

    Result: ALLOW

    Config:

    Additional information:

    in 192.168.245.33 255.255.255.255 outside

    Phase: 3

    Type: ACCESS-LIST

    Subtype: Journal

    Result: ALLOW

    Config:

    Access-group acl-Interior interface inside

    access list acl-Interior extended icmp permitted an echo

    Additional information:

    Phase: 4

    Type: IP-OPTIONS

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    Phase: 5

    Type: INSPECT

    Subtype: np - inspect

    Result: ALLOW

    Config:

    Additional information:

    Phase: 6

    Type:

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    Phase: 7

    Type: NAT

    Subtype:

    Result: ALLOW

    Config:

    NAT (inside, outside) static source any any destination static obj - 192.168.245.0

    obj - 192.168.245.0 no-proxy-arp-search to itinerary

    Additional information:

    Definition of static 0/x.x.x.x-x.x.x.x/0

    Phase: 8

    Type: VPN

    Subtype: encrypt

    Result: ALLOW

    Config:

    Additional information:

    Phase: 9

    Type: CREATING STREAMS

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    New workflow created with the 277723432 id, package sent to the next module

    Result:

    input interface: inside

    entry status: to the top

    entry-line-status: to the top

    output interface: outside

    the status of the output: to the top

    output-line-status: to the top

    Action: allow

    There is no route to the address pool of vpn. Maybe that's the problem? I don't know than that used to work before we went to 8.4.

    Check if the firewall is enabled on your host from the client ravpn and blocking your pings.

  • Cisco VPN Client and Windows XP VPN Client IPSec to ASA

    I configured ASA for IPSec VPN via Cisco VPN Client and XP VPN client communications. I can connect successfully with Cisco VPN Client, but I get an error when connecting with the XP client. Debugging said "misconfigured groups and transport/tunneling mode" I know, they use different methods of transport and tunneling, and I think that I have configured both. Take a look at the config.

    PS a funny thing - when I connect with client VPN in Windows Server 2003, I have no error. The only difference is that client XP is behind an ADSL router and client server is directly connected to the Internet on one of its public IP of interfaces. NAT in the case of XP can cause problems?

    Config is:

    !

    interface GigabitEthernet0/2.30

    Description remote access

    VLAN 30

    nameif remote access

    security-level 0

    IP 85.*. *. 1 255.255.255.0

    !

    access-list 110 scope ip allow a whole

    NAT list extended access permit tcp any host 10.254.17.10 eq ssh

    NAT list extended access permit tcp any host 10.254.17.26 eq ssh

    access-list extended ip allowed any one sheep

    access list nat-ganja extended permit tcp any host 10.254.17.18 eq ssh

    sheep-vpn access-list extended permits all ip 192.168.121.0 255.255.255.0

    tunnel of splitting allowed access list standard 192.168.121.0 255.255.255.0

    flow-export destination inside-Bct 192.168.1.27 9996

    IP local pool raccess 192.168.121.60 - 192.168.121.120 mask 255.255.255.0

    ARP timeout 14400

    global (outside-Baku) 1 interface

    global (outside-Ganja) interface 2

    NAT (inside-Bct) 0 access-list sheep-vpn

    NAT (inside-Bct) 1 access list nat

    NAT (inside-Bct) 2-nat-ganja access list

    Access-group rdp on interface outside-Ganja

    !

    Access remote 0.0.0.0 0.0.0.0 85.*. *. 1 2

    Route outside Baku 10.254.17.24 255.255.255.248 10.254.17.10 1

    Route outside Baku 192.1.1.0 255.255.255.0 10.254.17.10 1

    Outside-Baku route 192.168.39.0 255.255.255.0 10.254.17.10 1

    Route outside-Ganja 192.168.45.0 255.255.255.0 10.254.17.18 1

    Route outside-Ganja 192.168.69.0 255.255.255.0 10.254.17.18 1

    Route outside-Ganja 192.168.184.0 255.255.255.0 10.254.17.18 1

    Route outside Baku 192.168.208.16 255.255.255.240 10.254.17.10 1

    Route outside-Ganja 192.168.208.112 255.255.255.240 10.254.17.18 1

    dynamic-access-policy-registration DfltAccessPolicy

    Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT

    Crypto ipsec transform-set newset aes - esp esp-md5-hmac

    Crypto ipsec transform-set esp-3des esp-md5-hmac vpnclienttrans

    Crypto ipsec transform-set vpnclienttrans transport mode

    Crypto ipsec transform-set esp-3des esp-md5-hmac raccess

    life crypto ipsec security association seconds 214748364

    Crypto ipsec kilobytes of life security-association 214748364

    raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map

    vpnclientmap 30 card crypto ipsec-isakmp dynamic dyn1

    card crypto interface for remote access vpnclientmap

    crypto isakmp identity address

    ISAKMP crypto enable vpntest

    ISAKMP crypto enable outside-Baku

    ISAKMP crypto enable outside-Ganja

    crypto ISAKMP enable remote access

    ISAKMP crypto enable Interior-Bct

    crypto ISAKMP policy 30

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    No encryption isakmp nat-traversal

    No vpn-addr-assign aaa

    Telnet timeout 5

    SSH 192.168.1.0 255.255.255.192 outside Baku

    SSH 10.254.17.26 255.255.255.255 outside Baku

    SSH 10.254.17.18 255.255.255.255 outside Baku

    SSH 10.254.17.10 255.255.255.255 outside Baku

    SSH 10.254.17.26 255.255.255.255 outside-Ganja

    SSH 10.254.17.18 255.255.255.255 outside-Ganja

    SSH 10.254.17.10 255.255.255.255 outside-Ganja

    SSH 192.168.1.0 255.255.255.192 Interior-Bct

    internal vpn group policy

    attributes of vpn group policy

    value of DNS-server 192.168.1.3

    Protocol-tunnel-VPN IPSec l2tp ipsec

    Split-tunnel-policy tunnelspecified

    Split-tunnel-network-list value split tunnel

    BCT.AZ value by default-field

    attributes global-tunnel-group DefaultRAGroup

    raccess address pool

    Group-RADIUS authentication server

    Group Policy - by default-vpn

    IPSec-attributes tunnel-group DefaultRAGroup

    pre-shared-key *.

    Hello

    For the Cisco VPN client, you would need a tunnel-group name configured on the ASA with a pre-shared key.

    Please see configuration below:

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00805734ae.shtml

    or

    http://tinyurl.com/5t67hd

    Please see the section of tunnel-group config of the SAA.

    There is a tunnel-group called "rtptacvpn" and a pre-shared key associated with it. This group name is used by the VPN Client Group name.

    So, you would need a specific tunnel-group name configured with a pre-shared key and use it on the Cisco VPN Client.

    Secondly, because you are behind a router ADSL, I'm sure that's configured for NAT. can you please activate NAT - T on your ASA.

    "crypto isakmp nat-traversal.

    Thirdly, change the transformation of the value

    raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map

    Let me know the result.

    Thank you

    Gilbert

  • Between asa 5510 and router VPN

    Hello

    I configured ASA 5510 to vpn LAN to LAN with router 17 857. and between the routers.

    between vpn routers works very well.

    from the local network behind the ASA I can ping the computers behind routers.

    but computers behind routers, I cannot ping PSC behind ASA.

    I have configured the remote access with vpn cisco 4.X client, it works well with routers, but cannot work with asa.

    the asa is connected to the wan via zoom router (adsl)

    Are you telnet in the firewall?

    Follow these steps to display the debug output:

    monitor terminal

    farm forestry monitor 7 (type this config mode)

    Otherwise if its console, do "logging console 7'.

    can do

    Debug crypto ISAKMP

    Debug crypto ipsec

    and then generate a ping from one device to the back of the ASA having 192.168.200.0 address towards one of the VPN subnets... and then paste the result here

    Concerning

    Farrukh

  • Our ASA 5510 can provide VPN to our LAN cloud?

    Hi people,

    We have a number of (1 7 or if virtual, dedicated) servers hosted in a cloud provider well known on the West coast of the USA.

    They just put an ASA5510 across our LAN Server to help protect the servers.

    I was wondering if it is possible that the ASA5510 can provide VPN access to our LAN cloud? At the moment we have the firewall block - all - ports except 80/443/3389 (RDP for our Windows servers).

    I was actually hoping to block port 3389, so nobody can RDP on all servers. BUT... VPN in our LAN cloud, then we can connect to a server via RDP or any software / port. Indeed, the VPN opens all ports... you have created a VPN tunnel has provided

    So is this possible? The ASA5510 this offer?

    Last question-> and it's a ballast: gulp:...

    We cannot install any client software 3rd party... including any cisco vpn client software. We must use the built in software Windows7 VPN... making PPTP, SSTP, L2TP-IPSEC.

    So... now the ASA5510 can offer that? If so... is there any special scripts or configs I need to give to the Cloud hosting provider, so they can set the machine to work?

    Help, please!

    -Jussy-

    Two possibilities come to mind.

    -Built-in L2tp over Ipsec client.

    ASA config Guide:

    http://www.Cisco.com/en/us/docs/security/ASA/asa82/configuration/guide/l2tp_ips.html

    -Clientless webvpn (if RDP and other plugins, but requires java/activeX for some features...

    http://www.Cisco.com/en/us/docs/security/ASA/asa82/configuration/guide/WebVPN.html

    These options should work except ASA is in mode multi-conext.

    M.

  • Cisco ASA 5510 - restrictions of VPN (AnyConnect) based on the AD user or IP address

    Hello

    I want to test how to restrict access user on an ASA 5510 AnyConnect. In politics, I can define what networks will go through the VPN tunnel and which not (split tunneling). The ASA has a LDAP connection and only AD users with a special security group can connect over AnyConnect.
    On the other hand I would like to restrict access for special users within a VPN policy.

    So my question:
    What are your recommendations to implement this szenario?

    My two ideas would be:
    1. the access rules based on the user of the AD.
    2. special reserve IP addresses in the pool of addresses AnyConnect for some users, so I can limit access to the normal firewall rules base based on the source IP address.

    What are your recommendations and is it possible to realize my ideas (and how)?

    Thanks in advance

    Best regards

    Hello

    I will suggest that you configure a second ad group in the server and another group strategy in the ASA, you can configure certain access on each group policy "the installer of the filters, assign different split political tunnel, different ACL' and in the ad server, you can assign users for example to the AD Group A and AD Group B based on the access you want to give them now , you must configure LDAP mapping to assign the user specific group policy that you want based on the AD group that they belong.

    You can follow this documentation that will help you configure the LDAP Mapping:

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

    Best regards, please rate.

  • CISCO ASA 5505 no cisco VPN Client

    Hello

    I'm looking for after a firewall Cisco ASA 5505 and want to watch all the owners of it with remote access in but none of us have a support contract with Cisco.

    Is it possible to set up a VPN client not as Microsoft built the client to connect to the ASA?

    Thank you

    Alamb200

    Hello

    Looking for a PPTP on ASA connection?

    The following document provides the following:

    ASA q support PPTP client?

    A. number of the

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#supportfeat

    But we can configure ASA to allow the PPTP connection:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml

    I hope this helps.

    Kind regards

    Anisha

    P.S.: Please mark this thread as answered if you feel that your request is answered. Note the useful messages.

  • Split DNS on ASA 5510 access remote vpn works not

    I connect successfully to the tunnel and can ping hosts remotely by IP but am unable to browse the internet from the VPN client. Also, the resolution of host name on the remote end does not work... can only connect through the IP address. Ideas? Thanks again!

    Your group policy will SUFFER a good split tunneling and divide the dns settings. But I think that you are awarded the DfltGrpPolicy rather than your group policy will SUFFER because group policy is not set in your group of tunnel, nor be transmitted from authentication.

    Make a vpn-sessiondb distance 'show' to confirm what group policy is assigned to fix it, assign your group policy will BE to your group of tunnel as follows:

    global-tunnel-group attributes

    Will BE by default-group-policy

    -heather

  • With the help of ASA 5510 L2L and VPN L2TP

    I would let my remote users access to all resources bhind the ASA and my remote branches.

    Here's my setup.  ASA5510 as a hub to the data center.

    172.21.x.x of internal network directly connected

    DMZ directly connected 172.22.1.x.x

    L2L branch1 VPN 10.47.x.x

    L2L branch2 VPN 10.47.y.x

    172.21.y.x remote users L2TP Windows Client

    I can access my internal resources related to the ASA but not the DMZ or branch offices. I need injection road routing and reverse?

    You also need to configure crossed.  http://goo.GL/vLqAR

  • ASA 5510: beat s2s VPN

    Hi all

    I have a VPN of n-star with 5510 boxes in several places.

    Users complaining that s2s links are beat from time to time for both places.

    Here's the log output for the moments where the links are torn down:

    First spoke:

    07/07/2010-20:17:09 Local4.Notice % 713259-5-ASA: group = , IP = , Session is to be demolished. Reason: The user has requested
    07/07/2010-20:17:09 Local4.Notice % 5-ASA-713050: group = , IP = , missed connection for peer Reason: terminate Peer  Remote proxy 10.3.0.0 Proxy Local 172.16.100.0

    Second spoke:

    07/07/2010-18:34:45 Local4.Notice % 713259-5-ASA: group = , IP = , Session is to be demolished. Reason: Idle Timeout

    07/07/2010-18:34:45 Local4.Notice % 5-ASA-713050: group = , IP = , missed connection for peer Reason: IPSec SA time-out  Remote proxy 10.5.0.0, Proxy Local 172.16.100.0

    I think the bold text is the reason. But I don't know why a connection stop remote site1 and why to site2 is timeouts.

    I have HIS lifitime for 24h\4Gb to each ASA and the volume of traffic or time never pass in this case, KeepAlive is enabled to the ASA hub as well. I see a number or a "spacing" all day with the same reasons for termination that I presented above. Anyone has a suggestion or idea why s2s VPN are hinged and how make them more stable even if the traffic is not flowing throughout.

    Thanks in advance.

    Sergey,

    No matter how lucky you have vpn time-out configured on one of the sides (it may be in default group policy perhaps?)  (see the race from all political group | I vpn)

    "IPSec SA time-out"

    HTH,

    Marcin

  • Remote RDP client VPN access on ASA 5510

    Hello.

    We have configured the VPN tunnel from site of offshore to the location of the customer using ASA5510 and access to RDP to the location of the customer. Also been configured remote VPN access in offshore location. But using the remote VPN client, we are able to get the RDP of officeshore location but not able to access to the location of the RDP client. Are there any additional changes required?

    Thank you

    Hi Salsrinivas,

    so to summarize:

    the VPN client connects to the ASA offshore

    the VPN client can successfully RDP on a server at the offshore location

    the VPN client cannot NOT RDP on a server at the location of the customer

    offshore and the location of the customer are connected by a tunnel L2L

    (and between the 2 sites RDP works very well)

    is that correct?

    Things to check:

    -the vpn in the ACL crypto pool?

    -you're exemption nat for traffic between the vpn pool and 'customer' LAN? is the exemption outside (vpn clients are coming from the outside)?

    -you have "same-security-traffic permitted intra-interface" enabled (traffic will appear outside and go back outside)?

    If you need help more could you put a config (sterilized) Please?

    HTH
    Herbert

  • ASA VPN server and vpn client router 871

    Hi all

    I have ASA 5510 as simple VPN server and 871 router as simple VPN client. I want to have the user ID and permanent password on 871 and not to re - enter username and password since 871 uses dynamic IP address and every time I have to ' cry ipsec client ezvpn xauth "and type user name and password.

    any suggestions would be much appreciated.

    Thank you

    Alex

    Do "crypto ipsec client ezvpn show ' on 871, does say:

    ...

    Save password: refused

    ...

    ezVPN server dictates the client if it can automatically connect with saved password.

    Set "enable password storage" under the group policy on the ASA.

    Kind regards

    Roman

  • Cisco AnyConnect VPN Client 3.0 - could not load preferences

    Hello

    I have the problem that when I want to connect to the VPN (ASA 5510) with the AnyConnect Client 3.0 Gateway I get the error "Could not load preferences" when I try to connect via SSL of the SAA Portal, everthing works fine... I tried to reinstall the Client - without success... can someone tell me what is wrong with my client?

    THX

    Concerning

    Robert

    Hi Robert,.

    Follow these steps:

    -Allow a group alias or group-url for groups of tunnel.

    -Delete the profile XML of ASA (please export it all first to keep a backup).

    On the computer assigned:

    -Remove the Preferences.xml.

    -Remove the preferences_global.xml.

    -Delete the XML profile in the Profiles folder.

    Then reconnect the client.

    Let me know.

    Please rate this post if you find it useful.

  • Issue of ASA 5510

    Dear all,

    I applied ASA 5510 in my network,

    I configured 3 DMZ, inside and outside interfaces

    ASA, I can access the Interior, DMZ and outside (Internet)

    Inside users can communicate with the servers in the DMZ

    Inside users goto Internet via the external interface

    DMZ servers can goto Internet via the external interface

    The DMZ servers cannot Ping inside the network

    I've been using IpSec VPN on my router,

    clients connect to the router using the Cisco VPN Client software,

    NOW, when I understood ASA in the network, VPN clients are unable to communicate with the servers in the DMZ

    security level 0 for outside

    DMZ 50

    100 for the inside

    NAT is disabled with no command nat control

    What I need to ON the NAT and some ACL must be put in place...

    Please advise me what ACL I should implement, interface? Direction?

    Which statement NAT should I include?

    I want to access my network via VPN...

    Help, please

    Kind regards

    Junaid

    ICMP pings are not stateful. The firewall needs special treatment to dynamically allow pings back, this is done through the "ICMP inspection." The ICMP inspection is disabled by default. You can activate the inspection or use an ACL to allow ICMP traffic. Here is a useful link:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic0

    Please rate if useful.

    Concerning

    Farrukh

Maybe you are looking for