ASA5505 - VPN does not

Hello everyone,

I have problems to make IPsec VPN remote access work.

The goal is to be able to connect to our internal network from home or elsewhere.

When I try to connect to my home virtual private network, I will no further than Phase 1.

My architecture is a Cisco ASA5505 behind a router-modem router from ISP. The IP address of the modem is 192.168.1.1 for outside.

The IP address of the ASA is 192.168.1.254 for outdoor and 10.0.0.1 for indoors. I put the ASA in a demilitarized zone of the ISP modem to be able to reach it through the Internet (I wanted to use the ISP modem-router-bridge just as a simple gateway and handle other things with the ASA).

So my problem is that I can't seem to connect to the VPN through the public IP address.

Here is my config:

: Saved

:

ASA Version 8.2(5)

!

hostname Cisco-ASA-5505

enable password 8Ry2YjIyt7RRXU24 encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

interface Vlan1

nameif inside

security-level 100

ip address 10.0.0.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address 192.168.1.254 255.255.255.0

!

ftp mode passive

clock timezone GMT 1

access-list NONAT extended permit ip 10.0.0.0 255.255.255.0 10.0.1.0 255.255.255.0

pager lines 24

logging asdm informational

mtu inside 1500

mtu outside 1500

ip local pool VPNpool 10.0.1.1-10.0.1.50

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list NONAT

nat (inside) 1 0.0.0.0 0.0.0.0

route outside 0.0.0.0 0.0.0.0 192.168.1.1 1

route inside 192.168.2.0 255.255.255.0 10.0.0.42 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication ssh console LOCAL

http server enable

http 192.168.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set RA-TS esp-aes-256 esp-sha-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto dynamic-map DYN-MAP 10 set transform-set RA-TS

crypto map VPN-MAP 30 ipsec-isakmp dynamic DYN-MAP

crypto map VPN-MAP interface outside

crypto isakmp enable outside

crypto isakmp policy 20

authentication pre-share

encryption aes-256

hash sha

group 2

lifetime 3600

telnet timeout 5

ssh 192.168.1.0 255.255.255.0 inside

ssh 10.0.0.0 255.255.255.0 inside

ssh timeout 5

console timeout 0

dhcpd address 10.0.0.10-10.0.0.40 inside

dhcpd dns 81.253.149.9 80.10.246.1 interface inside

dhcpd update dns both override interface inside

dhcpd enable inside

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

tftp-server inside 10.0.0.42 /srv/tftp/cisco-rtr-01-config

webvpn

username admin password 4RdDnLO1w2ilihWc encrypted

username test password zGOnThs6HPdiZhqs encrypted

tunnel-group testvpn type remote-access

tunnel-group testvpn general-attributes

address-pool VPNpool

tunnel-group testvpn ipsec-attributes

pre-shared-key *****

!

!

prompt hostname context

no call-home reporting anonymous

Cryptochecksum:c3d233f44e742110aa0ce1f81173d47c

: end

My config to the client is attached.

When I look at what happened during the connectin with Wireshark, I see 'Port Unreachable '. I have to do something on my ISP router? Because I read that it is not necessary to use NAT if the device is in the demilitarized zone.

Can you help me please?

Because you have the address on your external interface, you will need to tell your router to forward traffic to ASA. So you can do NAT or port forward to ASA.

I guess you don't have a single address public IP assigned by your ISP.

Kind regards

Jan

Tags: Cisco Security

Similar Questions

  • After the upgrade yesterday from Vista to Windows 7, now my Cisco VPN does not work and I get an error message titled: grounds 440 driver fault. Any ideas to fix this?

    After the upgrade yesterday from Vista to Windows 7, now my Cisco VPN does not work and I get an error message titled: grounds 440 driver fault.  Any ideas to fix this?

    This was the solution!  The works of vpn as $ 1 million now.  I followed the instructions above to enter the uninstall program and selecting the repair option.  I rebooted the machine, then used the troubleshooting on vpn software compatibility option.  Selected Windows windows xp (service pack 2) as the correct software and cisco vpn client started right up.

    Thanks, Nick!

    Rick

  • Œuvres ping for the VPN ASA5505 RDP does not work?

    I have an ASA5505 VPN remote access facility

    I have a server connected directly behind the ASA and I can ping the server without problem.

    The reports being encrypted and decrypted packets VPN client

    However when I try to RDP to the server packages encyrpted keep incrementing but the decrypted packets are not.

    I also do not see all RDP traffic hit the server (checked by ethereal)

    I did a packet trace and it succeeds, but ends with a parody of IP which I believe is correct as is the vpn traffic and not actually be encrypted.

    This is the correction of the RDP session, I'm confused by one ICMP denied on line 2 that I am able to ping the server?

    % ASA-6-302013: built of TCP connections incoming 88193 for external:172.16.24.4/50984 (172.16.24.4/50984) at internal:192.168.100.146/3389 (192.168.100.146/3389) (roger_ssl)

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.146: no matching session

    % ASA-609001 7: built internal local-host: 192.168.100.37

    % ASA-6-302015: built connection UDP incoming 88194 for external:172.16.24.4/50620 (172.16.24.4/50620) at internal:192.168.100.37/53 (192.168.100.37/53) (roger_ssl)

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.37: no matching session

    % ASA-6-302015: built connection UDP incoming 88195 for external:172.16.24.4/64598 (172.16.24.4/64598) at internal:192.168.100.37/53 (192.168.100.37/53) (roger_ssl)

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.37: no matching session

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.37: no matching session

    % 302014-6-ASA: disassembly of the TCP connection 88193 for external:172.16.24.4/50984 to internal:192.168.100.146/3389 duration 0: bytes of 00:00 0 flow closed by inspection (roger_ssl)

    I have that configured NAT

    NAT (internal, external) static source 192.168.100.0 192.168.100.0 static destination VPN_172 VPN_172

    The only logical bit that is closed by the inspection flow? Is this to say that the server has not responded?

    And decrypt packets increase not when trying to RDP

    Does this mean anyting to anyone that I have arrived at the end of my knowledge of the SAA on this one!

    Thank you

    Roger

    Answer is based on your other thread:

    https://supportforums.Cisco.com/thread/2207372

  • PPTP VPN does not work on Iphone Personal Hotspot

    Hello

    I've just updated to iOS 10 yesterday and now all my devices I use to connect to the personal hotspot on my iphone are not able to establish PPTP VPN connections. I was aware of the PPTP client are disabled in the iOS, but has actually blocked PPTP are not used by devices that connect to the Personal Hotspot?

    Please help ASAP, I know there are many more end-users like me having the same problem.

    Hello

    Apple does not recommend using the PPTP protocol for secure and private communication.

    iOS 10 and macOS Sierra intentionally delete a VPN profile PPTP connections when a user upgrades from their device.

    Apple recommends using another VPN protocol which is safer:

    More information:

    Prepare for removal of PPTP VPN before you upgrade to iOS 10 and macOS Sierra - Apple Support

  • I use a VPN in AirPort Express. I've updated firmware for 7.7.7 and DNS assigned by my VPN does not work anymore. Upon entry, the icon 'internet' in utility Airpot turns brown, and the internet stops completely. Anyone have any idea?

    Why my internet connection dies? I use a VPN to my internet at home. I put the DNS numbers supplied by the company VPN in my airPort extreme, which, in turn, provides wireless for home. It worked perfectly until I updated to firmware 7.7.7. Suddenly the green light next to the 'internet' in airport Utility icon went Brown, and it is therefore most all internet. I put numbers in DNS to my ISP, and internet provider is displayed again. All the other numbers in DNS, whether it's Google, OpenDNS or VPN to stop the dead from the internet. Anyone has an idea about this?

    Airport base stations, are at best, a VPN-well past that device. It is a server or a VPN client. Upgrade to the latest firmware does not change this fact.

    To create a VPN tunnel using the AirPort Express Terminal, your computer must be running a VPN client that connects to a VPN server somewhere on the Internet. What DNS servers you use should make no difference with VPN.

    If the ISP-supplied DNS servers do not work, I would say that you contact your ISP to find out why they don't allow you to use them.

    What we need to study is more why you lose Internet connectivity when changing the DNS servers of your ISP. Please check with them and to report back, then we can try to help.

  • Check sensor SFR with FireSight via VPN - does not work

    Hello security experts.

    I have an ASA5515-X with SFR installed 5.4.0 and manage with 5.4 FireSight installed on the virtual machine on LAN and I record the sensor without any problem but when I try to register the sensor to FireSight via VPN I can't do. The interface on the ASA management has no intellectual property nor nameif configured and the interface is connected to the switch, SFR has the IP even configured as LAN addressing. I can see traffic being exchanged between the sensor and the FireSight but I can't save the sensor.

    Has anyone managed to register the sensor via VPN? Is there something else to be configured in order to save the sensor with the MC via the VPN?

    The delay between the Firesight and the sensor (on WAN and VPN) I get between 80 and 100 ms, what could be the problem?

    Thank you very much!

    Remi

    Hello

    If you are unable to telnet from DC to the sensor on the port 8305 delivers connectivity then.

    Can try you to ping from sensor to DC:

    ping -M do -c 20 -s 1572 
    By default, the MTU is 1500 on eth0, if the ping does not work I will suggest to lower the MTU on the interface and see if it works. See also: / var/log/messages | grep sftunnel and see the error messages on DC and sensor and send it to me everywhere. Best regards, Aastha Bhardwaj rate if this is useful!
  • remote VPN does not work on Cisco 7206

    Hello

    I do a test to set up remote access to VPN from Cisco 7206 (simulated by dynamips). The relevant configuration is the following:

    hub host name

    AAA new-model

    AAA authentication login local xauth

    username ciscouser password 0 cisco1234

    IP subnet zero

    crypto ISAKMP policy 10

    md5 hash

    Group 2

    preshared authentication

    test group crypto isakmp client configuration

    key cisco123

    pool mypool

    card crypto REMOTEACCESS client authentication list xauth

    Crypto ipsec transform-set RTP-TRANSFORMATION des-esp esp-md5-hmac

    Vpn crypto dynamic-map 1

    game of transformation-RTP-TRANSFORM

    open crypto map REMOTEACCESS client configuration address

    card crypto client configuration address respond REMOTEACCESS

    card crypto REMOTEACCESS 1-isakmp dynamic vpn ipsec

    interface Ethernet0/0

    IP address 150.1.1.1 255.255.255.0

    card crypto REMOTEACCESS

    interface Ethernet0/1

    IP 11.10.1.1 255.255.255.0

    no ip directed broadcast to the

    IP local pool mypool 10.1.10.0 10.1.10.254

    IP nat translation timeout never

    IP nat translation tcp-timeout never

    IP nat translation udp timeout never

    IP nat translation finrst-timeout never

    IP nat translation syn-timeout never

    IP nat translation dns-timeout never

    IP nat translation icmp timeout never

    IP classless

    IP route 0.0.0.0 0.0.0.0 10.103.1.1

    no ip address of the http server

    end

    However, when I try to connect the router using the Cisco 4.6 client, you receive the following error message:

    05:04:52: ISAKMP (0:1): audit ISAKMP transform 13 against the policy of priority 10

    05:04:52: ISAKMP: DES-CBC encryption

    05:04:52: ISAKMP: MD5 hash

    05:04:52: ISAKMP: group by default 2

    05:04:52: ISAKMP: auth XAUTHInitPreShared

    05:04:52: ISAKMP: type of life in seconds

    05:04:52: ISAKMP: life (IPV) 0x0 0 x 20 0xC4 0x9B

    05:04:52: ISAKMP (0:1): pre-shared key offered Xauth authentication but does not match policy.

    05:04:52: ISAKMP (0:1): atts are not acceptable. Next payload is 3

    05:04:52: ISAKMP (0:1): audit ISAKMP transform 14 against the policy of priority 10

    05:04:52: ISAKMP: DES-CBC encryption

    05:04:52: ISAKMP: MD5 hash

    05:04:52: ISAKMP: group by default 2

    05:04:52: ISAKMP: pre-shared key auth

    05:04:52: ISAKMP: type of life in seconds

    05:04:52: ISAKMP: life (IPV) 0x0 0 x 20 0xC4 0x9B

    05:04:52: ISAKMP (0:1): pre-shared authentication offered but does not match policy.

    05:04:52: ISAKMP (0:1): atts are not acceptable. Next payload is 0

    Does anyone have an idea? Thanks in advance.

    Wang,

    Thanks for the update! Happy in his work.

    The commands below are for the search for group policy.

    AAA authorization groupauthor LAN

    card crypto isakmp authorization list groupauthor REMOTEACCESS

    Since then, you have configured Group Policy (name, presharedkey, etc.) locally on the router, you must specify the router where to look for the isakmp policy when VPN cace tries to connect.

    I hope it helps.

    Kind regards

    Arul

    * Please note all useful messages *.

  • PIX and ASA static, dynamic and RA VPN does not

    Hello

    I am facing a very interesting problem between a PIX 515 and an ASA 5510.

    The PIX is in HQ and has several dynamic VPN connections (around 130) and IPsec vpn remote works very well. I had to add a PIX to ASA L2L VPN static and it does not work as it is supposed to be. The ASA 5510, at the remote end, connects and rest for a small period of time, however, all other VPN connections stop working.

    The most interesting thing is that ASA is associated with the dynamic map and not the static map that I created (check by sh crypto ipsec his counterpart x.x.x.x). However, if I make any changes in the ACL 'ACL-Remote' it affects the tunnel between the PIX and ASA.

    Someone saw something like that?

    Here is more detailed information:

    HQ - IOS 8.0 (3) - PIX 515

    ASA 5510 - IOS 7.2 (3) - remote provider

    Several Huawei and Cisco routers dynamically connected via ADSL

    Several users remote access IPsec

    A VPN site-to site static between PIX and ASA - does not.

    Here is the config on the PIX:

    Crypto ipsec transform-set ESP-3DES-ESP-SHA-HMAC-IPSec esp-3des esp-sha-hmac

    Dyn - VPN game 100 Dynamics-card crypto transform-set ESP-3DES-ESP-SHA-HMAC-IPSec

    Crypto dynamic-map Dyn - VPN 100 the value reverse-road

    VPN - card 30 crypto card matches the ACL address / remote

    card crypto VPN-card 30 peers set 20 x. XX. XX. XX

    card crypto VPN-card 30 the transform-set ESP-3DES-ESP-SHA-HMAC-IPSec value

    VPN crypto card - 100 - isakmp dynamic Dyn - VPN ipsec

    interface card crypto VPN-card outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    crypto ISAKMP policy 65535

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    access list ACL-remote ext ip 10.0.0.0 allow 255.255.255.0 192.168.1.0 255.255.255.0

    Thank you.

    Marcelo Pinheiro

    The problem is that the ASA has a crypto acl defined between host and network, while the remote end has to the network.

    Make sure that the acl is reversed.

  • Cisco Anyconnect VPN does not work in windows 7 64 bit

    Hello
    I found that the cisco anyconnect (version 3, any series) does not work in windows 7 (64-bit).
    The vpn is connected, but there is not any internet access.

    I tried to solve the problems of:

    -Disabling the firewall.

    -disable the anti-virus etc.

    But while I tried using with 32 bit, it works very well.

    Also, I found that there is not a specific version of anyconnect vpn for only 64-bit.

    Do any body have the idea how to solve this problem, either it's a bug of cisco vpn itself?

    Certainly, you just need to install a later version of AnyConnect.  You need a Cisco, for example a SmartNet maintenance contract, to download the new versions.

  • L2l ios VPN does not

    Hi all

    I am reproducing my client on the GNS scénarion.

    It is a frank l2l ios vpn and I use on two NAT routers.

    When I train trigger (ping using the source interface) VPN, VPN is not coming, and there is no error during the isakmp debug

    Please go through the configuration below and suggest me

    Thanks toufik

    It does not appear to be configured for each LAN routing. May need to configure the default route on each router to point to the other.

    In addition, enabling the option 'enable isakmp crypto '.

    All the other configuration looks OK.

  • VPN does not connect in some places

    I have a laptop running v5 Cisco VPN Client that connects to the office of some places network fine, but not other places.  and in the places where it does not connect, it connects fine to another unrelated network.  by "does not connect", I mean that I can't access any of the resources on the office network - the client software seems to work, but there is no access, I cannot ping anything on the office network.  What would cause this?  Here is the log file from a location where it does not connect to the office network:

    Cisco Systems VPN Client 5.0.07.0290 Version
    Copyright (C) 1998-2010 Cisco Systems, Inc.. All rights reserved.
    Customer type: Windows, Windows NT
    Running: 6.1.7600
    Directory of config files: E:\Cisco systems VPN Client\

    1 21:36:30.625 07/03/11 Sev = WARNING/2 CVPND/0xE3400013
    AddRoute cannot add a route which the metric is 0: code 160
    Destination 5.0.0.0
    Subnet mask 255.0.0.0
    Gateway 192.36.253.1
    Interface 192.36.253.179

    2 21:36:30.625 07/03/11 Sev = WARNING/2 CM/0xA3100024
    Failed to add the route. Network: 5000000, subnet mask: ff000000, Interface: c024fdb3 Gateway: c024fd01.

    in this particular case, the local network uses the range of 192.168.1.x IP addresses, so that shouldn't be a problem.

    Lee

    Could you go through a PAT instrument, so you are not able to access resources after the VPN is connected because ESP packets usually will not go through a PAT tool.

    What must be configured on the VPN server is to allow NAT - t (NAT Traversal), IE: encapsulation of the ESP package in UDP or TCP packet, then it passes through PAT instrument very well.

    What server VPN should you terminate the VPN Client?

    The command to activate on the SAA would be: crypto isakmp nat-traversal 20

    Let me know if you have other devices like the VPN server.

    Hope that helps.

  • VPN does not boot... ASA 5505

    Hi all

    I encountered a problem and hopefully one (or more!) of you have seen this before.

    I configured an ASA5505 to be endpoint tunnel VPN Lan to Lan, peering with a Linux links.  The SAA is full licensed so that side is not a problem.

    PROBLEM:

    When the tunnel is initialized from the linux box everything is happening very well except the ASA is not encapsulation of packages.  They are decrypted packets from the Linux box agreement, but not return traffic are encryption.

    When the tunnel is initialized to the ASA, nothing happens.

    After some troubleshooting I found that the ACL defines interesting traffic or the ACL setting NO_NAT will are not affected at all.

    ACL for NO_NAT:

    access-list NO_NAT line 1 Note USED ACL TO DEFINE WHAT TRAFFIC NOT NAT ON THE VPN

    permit for line NO_NAT of access list lengthened 2 ip host LINUX-AREAS of PAMS_SERVER object-group 0xc736d5fb

    allowed to Access - list NO_NAT line 2 extended host ip PAMS_SERVER 10.11.228.0 255.255.255.0 (hitcnt = 0)

    ACL for interesting traffic

    LNX_IPSEC list of access; 2 elements; hash name: 0xda433bf

    Line note 1 LNX_IPSEC to access list ACL USED TO DEFINE WHAT TRAFFIC to ENCRYPT

    permit for line LNX_IPSEC of access list lengthened 2 ip host LINUX-AREAS of PAMS_SERVER object-group 0x49989fbd

    allowed to Access - list LNX_IPSEC line 2 extended host ip PAMS_SERVER 10.11.228.0 255.255.255.0 (hitcnt = 0) 0x6f1aad85

    permits for Access - list extended LNX_IPSEC line of 3 ip host 10.1.85.156 LINUX-AREAS of 0x034eece3 object-group

    allowed for extended access list of 3 ip host 10.1.85.156 LNX_IPSEC line 10.11.228.0 255.255.255.0 (hitcnt = 0) 0xc3b2fc0b

    I checked with the administrator of the linux machine and the definition of interesting traffic is exactly the same (except in reverse, that should be the case).

    The firewall is doing other things such as NATs and as too but the NATs have nothing to do with this VPN.  The configuration is a LAN connection to LAN with no natting between the two.

    The main parts of the config are attached, I deleted that should have an impact on this, but if you think it is necessary I can clean up the config and re-post.  I think it will work very well as long as the traffic hitting these ACLs, but they are not and I'm not sure why.

    Right now I don't see anything when doing a Cree debugging ipsec or debug cry ISA.  The ACL are not being touched so I think he's trying to not even form the VPN as it can not see all traffic which is being 'interesting '.

    Has anyone seen this problem before or someone has any advice that I might be able to use to make it work?

    Thanks in advance for any help

    Brad

    How are those that hosts (PAMS_Server and 10.1.85.156) which is routed? You did not include the routing within the clinical setting and wondered if the routing is correct.

  • Cisco VPN does not work in the Sierra

    I just upgraded to OS Sierra and the Cisco VPN, I had the installer does connect more.  The Setup looks right into network preferences. When I click it looks like it is trying but stops without asking for a password.

    Cisco VPN client may need to update or re-installed. If she uses the PPTP Protocol, it will not work. Support for PPTP was ignored, because it is no longer considered as secure.

  • Re: VPN does not work on my new Portege Z830

    I recently bought a portege z830. I installed the software of watchguard firebox vpn connection, but I cannot establish a vpn connection. I enter the user name and password, the program seems to make a connection, but it immediately disconnects. There is no problem with the password or user name.

    The software works fine in other laptops. The operating system on the computer is Windows 7 Prof.(X64).

    Thank you

    I put t really know if described issue has anything directly with your new Portege. I presume that you need this for your business or you would use in your business so that I would highly recommend you to speak with your local administrator and check out what we can do about it.

    On this virtual path, it is not easy to say what the problem is here. On my Satellite P500 I use Cisco AnyConnect VPN client and it works perfectly with preinstalled original Toshiba recovery image. It's Win7 64-bit Home Premium edition.

  • Client VPN does not install

    Greetings,

    Try to install the VPN clinet version 5.0.07.0290 on WinXP box.

    Gets to a certain point then - error

    Error 27850.  Unable to manage the network components.

    The corruption of the operating system can prevent installation.

    I asked this question here before - and received responses instructioning me to uninstall the client.

    This canoe do since there is no element installed in Add / Remove programs to point to uninstall.  I deleted the folder created, but it makes no difference - each time the system stops at the same point.

    Any other ideas?

    Is your Windows XP 32-bit or 64-bit?

    There are 2 version of VPN Client 5.0.07.0290:

    32-bit: vpnclient-win-msi - 5.0.07.0290 - k9.exe

    64-bit: vpnclient-winx64-msi - 5.0.07.0290 - k9.exe

    Please, please make sure you use the right software.

    Here are the steps that will allow the uninstall:

    (1) remove the VPN Client (any version) of the machine using the MSI cleanup tool
    http://support.Microsoft.com/kb/290301

    Updated the DNE using this deterministic networks link
    http://www.deterministicnetworks.com/support/dnesupport.asp

    Run the WINFIX application, then the upgrade DNE.

    (2) take a backup of the registry.
    (3) on your desktop, click Start > run and type regedit.
    (4) delete the following keys:

    (a) go to HKEY_LOCAL_MACHINE > SOFTWARE > Cisco Systems > customer VPN.
    (b) go to HKEY_LOCAL_MACHINE > SOFTWARE > deterministic networks and remove the keys.
    Note: Sometimes the system will not allow deletion of this key.

    (c) go to HKEY_LOCAL_MACHINE > SOFTWARE > Microsoft > Windows > CurrentVersion > uninstall > {5624c000-b109-11d4-9db4-00e0290fcac5}.
    (d) delete all the old files deterministic NDIS Extender (DNE): all files starting with DNE, as all are coming files and Client VPN facilities.

    dne2000.sys %SystemRoot%\system32\drivers
    dne2000m.inf and dne2000m.pnf of %SystemRoot%\inf

    (e) the enumeration of original manufacturers of hardware (OEM) of the dne2000.inf and dne2000.pnf files.

    The OEM enumeration .inf file is a file called ".inf oem (digital value)."
    For example, oem2.inf and oem2.pnf.

    Note: Be sure to remove only the DNE OEM files.

    dneinobj.dll % SystemRoot%\system32. You may need to reboot for this file can be deleted.

    (f) delete the following file: cvpndrv.sys to %SystemRoot%\system32\drivers

    (5) reboot the machine.

    (6) find the file CSGina.dll in the system32 folder rename it to CSGina.old

    7-restart the machine.

    (8) to disable any firewall if not installed.

    Hope that helps.

Maybe you are looking for