Connectivity problems from site to Site - ASA and PIX

I'm trying to set up a tunnel between the ASA and PIX but I have some difficulty.

On the side of the ASA

June 29 at 08:09:44 [IKEv1]: Group = 190.213.57.203, IP = 190.213.57.203, error QM WSF (P2 struct & 0xc9309260, mess id 0x7e79b74e).

June 29 at 08:09:44 [IKEv1]: Group = 190.213.57.203, IP = 190.213.57.203, peer table correlator Removing failed, no match!

June 29 at 08:09:44 [IKEv1]: Group = 190.213.57.203, IP = 190.213.57.203, Session is be demolished. Reason: Phase 2

On the side of PIX

ISAKMP (0): the total payload length: 37
to return to the State is IKMP_NO_ERROR
crypto_isakmp_process_block:src:63.143.77.114, dest:190.213.57.203 spt:500 dpt:500
Exchange OAK_MM
ISAKMP (0): processing ID payload. Message ID = 0
ISAKMP (0): HASH payload processing. Message ID = 0
ISAKMP (0): load useful treatment vendor id

ISAKMP (0): Peer Remote supports dead peer detection

ISAKMP (0): SA has been authenticated.

ISAKMP (0): start Quick Mode Exchange, M - ID - 813626169:cf810cc7IPSEC (key_engine): had an event of the queue...
IPSec (spi_response): spi 0xbb1797c2 graduation (3138885570) for SA
from 63.143.77.114 to 190.213.57.203 for prot 3

to return to the State is IKMP_NO_ERROR
ISAKMP (0): send to notify INITIAL_CONTACT
ISAKMP (0): sending message 24578 NOTIFY 1 protocol
Peer VPN: ISAKMP: approved new addition: ip:63.143.77.114/500 Total VPN peers: 2
Peer VPN: ISAKMP: ip:63.143.77.114/500 Ref cnt is incremented to peers: 1 Total VPN peers: 2
crypto_isakmp_process_block:src:63.143.77.114, dest:190.213.57.203 spt:500 dpt:500
ISAKMP (0): processing NOTIFY payload 14 Protocol 3
SPI 0, message ID = 2038434904
to return to the State is IKMP_NO_ERR_NO_TRANS
crypto_isakmp_process_block:src:63.143.77.114, dest:190.213.57.203 spt:500 dpt:500
ISAKMP (0): processing DELETE payload. Message ID = 1798094647, spi size = 16
ISAKMP (0): delete SA: src 190.213.57.203 dst 63.143.77.114
to return to the State is IKMP_NO_ERR_NO_TRANS
ISADB: Reaper checking HIS 0x11fa6fc, id_conn = 0
ISADB: Reaper checking HIS 0x121ac3c, id_conn = 0 DELETE IT!

Peer VPN: ISAKMP: ip:63.143.77.114/500 Ref cnt decremented to peers: 0 Total of VPN peers: 2
Peer VPN: ISAKMP: deleted peer: ip:63.143.77.114/500 VPN Total peers:1IPSEC (key_engine): had an event of the queue...
IPSec (key_engine_delete_sas): rec would remove the ISAKMP notify
IPSec (key_engine_delete_sas): remove all SAs shared with 63.143.77.114

The ASA configuration

ASA Version 8.2 (5)

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

interface Vlan1

nameif inside

security-level 100

IP 192.168.102.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

IP 63.143.77.114 255.255.255.252

!

passive FTP mode

clock timezone IS - 5

DNS lookup field inside

DNS domain-lookup outside

DNS server-group DefaultDNS

domain lexlocal

object-group service DM_INLINE_SERVICE_3

the eq https tcp service object

the eq telnet tcp service object

ICMP service object

the purpose of the service tcp - udp eq www

the udp service object

object-group service DM_INLINE_SERVICE_5

the udp service object

the tcp service object

the purpose of the service tcp - udp eq www

the purpose of the service tcp eq www

the purpose of the service udp eq www

ICMP service object

object-group service DM_INLINE_SERVICE_8

the eq https tcp service object

the purpose of the service tcp - udp eq www

object-group Protocol DM_INLINE_PROTOCOL_1

ip protocol object

object-protocol udp

object-tcp protocol

object-group service DM_INLINE_SERVICE_4

the purpose of the service tcp - udp eq www

the eq https tcp service object

EQ-tcp smtp service object

the purpose of the udp eq snmp service

the purpose of the ip service

ICMP service object

object-group Protocol DM_INLINE_PROTOCOL_2

ip protocol object

object-protocol udp

object-tcp protocol

object-group Protocol DM_INLINE_PROTOCOL_3

ip protocol object

object-protocol udp

object-tcp protocol

inside_nat0_outbound list of allowed ip extended access all VPN_Access 255.255.255.240

access extensive list ip 192.168.102.0 inside_nat0_outbound allow Barbado-internal 255.255.255.0 255.255.255.0

inside_nat0_outbound list of allowed ip extended access all VPN_Access 255.255.255.192

access extensive list ip 192.168.102.0 inside_nat0_outbound allow 255.255.255.0 JA_Office_Internal 255.255.255.0

access extensive list ip 192.168.102.0 inside_nat0_outbound allow 255.255.255.0 P.O.S_Office_internal 255.255.255.0

outside_authentication list extended access allowed object-group DM_INLINE_PROTOCOL_3 all all idle state

inside_access_in access-list extended ip any any idle state to allow

inside_access_in list extended access allowed object-group host Jeremy DM_INLINE_SERVICE_5 all

inside_access_in list extended access allowed object-group DM_INLINE_SERVICE_3 192.168.102.0 255.255.255.0 any

inside_access_in list extended access allowed object-group DM_INLINE_PROTOCOL_1 192.168.102.0 255.255.255.0 192.168.102.0 255.255.255.0

outside_access_in list extended access allowed object-groups DM_INLINE_PROTOCOL_2 host interface idle outside Jeremy

outside_access_in list extended access allowed object-group DM_INLINE_SERVICE_4 any external interface

extended access list ip 255.255.255.0 Barbado-internal outside_access_in allow 192.168.102.0 255.255.255.0

outside_access_in list extended access allowed object-group DM_INLINE_SERVICE_8 any inactive external interface

IP JA_Office_Internal 255.255.255.0 JA_Office_Internal 255.255.255.0 allow Access-list extended outside_access_in

IP P.O.S_Office_internal 255.255.255.0 P.O.S_Office_internal 255.255.255.0 allow Access-list extended outside_access_in

access extensive list ip 192.168.102.0 outside_1_cryptomap allow Barbado-internal 255.255.255.0 255.255.255.0

access extensive list ip 192.168.102.0 outside_2_cryptomap allow 255.255.255.0 JA_Office_Internal 255.255.255.0

access extensive list ip 192.168.102.0 outside_3_cryptomap allow 255.255.255.0 P.O.S_Office_internal 255.255.255.0

pager lines 24

Enable logging

asdm of logging of information

Within 1500 MTU

Outside 1500 MTU

mask of local pool remote_users 192.168.200.1 - 192.168.200.10 IP 255.255.255.0

mask of local pool VPN_IPs 192.168.200.25 - 192.168.200.50 IP 255.255.255.248

no failover

ICMP unreachable rate-limit 1 burst-size 1

ICMP allow any inside

don't allow no asdm history

ARP timeout 14400

Global 1 interface (outside)

NAT (inside) 0-list of access inside_nat0_outbound

NAT (inside) 1 0.0.0.0 0.0.0.0

inside_access_in access to the interface inside group

Access-group outside_access_in in interface outside

Route outside 0.0.0.0 0.0.0.0 63.143.77.113 1

Timeout xlate 03:00

Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

Floating conn timeout 0:00:00

dynamic-access-policy-registration DfltAccessPolicy

the ssh LOCAL console AAA authentication

AAA authentication match outside the LOCAL outside_authentication

Enable http server

No snmp server location

No snmp Server contact

Server enable SNMP traps snmp authentication linkup, linkdown cold start

Sysopt connection timewait

Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

Crypto ipsec transform-set esp-3des esp-sha-hmac TRANS_ESP_3DES_SHA

Crypto ipsec transform-set transit mode TRANS_ESP_3DES_SHA

Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

life crypto ipsec security association seconds 28800

Crypto ipsec kilobytes of life - safety 4608000 association

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set

Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

card crypto outside_map 1 match address outside_1_cryptomap

card crypto outside_map 1 set pfs

peer set card crypto outside_map 1 200.50.87.198

card crypto outside_map 1 set of transformation-ESP-3DES-SHA

card crypto outside_map 2 match address outside_2_cryptomap

card crypto outside_map 2 set pfs

peer set card crypto outside_map 2 66.54.113.191

card crypto outside_map 2 game of transformation-ESP-3DES-SHA

card crypto outside_map 3 match address outside_3_cryptomap

card crypto outside_map 3 set pfs

peer set card crypto outside_map 3 190.213.57.203

card crypto outside_map 3 game of transformation-ESP-DES-MD5

outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

outside_map interface card crypto outside

crypto ISAKMP allow outside

crypto ISAKMP policy 10

preshared authentication

3des encryption

sha hash

Group 2

life 86400

crypto ISAKMP policy 30

authentication crack

3des encryption

sha hash

Group 2

life 86400

crypto ISAKMP policy 50

preshared authentication

the Encryption

md5 hash

Group 2

life 86400

crypto ISAKMP policy 65535

preshared authentication

3des encryption

sha hash

Group 2

life 86400

crypto ISAKMP disconnect - notify

Telnet timeout 5

SSH timeout 5

Console timeout 0

dhcpd address 192.168.102.30 - 192.168.102.50 inside

dhcpd dns 66.54.116.4 66.54.116.5 interface inside

dhcpd allow inside

!

dhcpd dns 66.54.116.4 66.54.116.5 outside interface

!

a basic threat threat detection

Statistics-list of access threat detection

a statistical threat detection tcp-interception rate-interval 30 burst-400-rate average rate 200

WebVPN

allow outside

internal DefaultRAGroup group strategy

attributes of Group Policy DefaultRAGroup

VPN-tunnel-Protocol svc

lexlocal value by default-field

WebVPN

SVC keepalive no

internal DefaultRAGroup_1 group strategy

attributes of Group Policy DefaultRAGroup_1

Protocol-tunnel-VPN l2tp ipsec

lexlocal value by default-field

WebVPN

SVC keepalive no

internal VPN_Tunnel_Client group strategy

attributes of Group Policy VPN_Tunnel_Client

value of server DNS 192.168.102.1

Protocol-tunnel-VPN IPSec l2tp ipsec svc

lexlocal value by default-field

username VPN_Connect password 6f7B + J8S2ADfQF4a/CJfvQ is nt encrypted

username VPN_Connect attributes

type of nas-prompt service

xxxxex iFxSRrE9uIWAFjJE encrypted password username

attributes global-tunnel-group DefaultRAGroup

address pool remote_users

address pool VPN_IPs

Group Policy - by default-DefaultRAGroup_1

IPSec-attributes tunnel-group DefaultRAGroup

pre-shared key *.

tunnel-group 200.50.87.198 type ipsec-l2l

IPSec-attributes tunnel-group 200.50.87.198

pre-shared key *.

type tunnel-group VPN_Tunnel_Client remote access

attributes global-tunnel-group VPN_Tunnel_Client

address pool remote_users

Group Policy - by default-VPN_Tunnel_Client

IPSec-attributes tunnel-group VPN_Tunnel_Client

pre-shared key *.

tunnel-group 66.54.113.191 type ipsec-l2l

IPSec-attributes tunnel-group 66.54.113.191

pre-shared key *.

tunnel-group 190.213.57.203 type ipsec-l2l

IPSec-attributes tunnel-group 190.213.57.203

pre-shared key *.

!

class-map inspection_default

match default-inspection-traffic

!

!

type of policy-card inspect dns preset_dns_map

parameters

maximum message length automatic of customer

message-length maximum 512

Policy-map global_policy

class inspection_default

inspect the preset_dns_map dns

inspect the ftp

inspect h323 h225

inspect the h323 ras

Review the ip options

inspect the netbios

inspect the rsh

inspect the rtsp

inspect the skinny

inspect esmtp

inspect sqlnet

inspect sunrpc

inspect the tftp

inspect the sip

inspect xdmcp

!

global service-policy global_policy

context of prompt hostname

no remote anonymous reporting call

call-home

Profile of CiscoTAC-1

PIX configuration

lexmailserver name 192.168.1.3

name 192.168.1.120 Lextt-SF

name 192.168.1.6 Lextt-ms

name 192.168.100.0 Barbados

name 192.168.102.0 Data_Center_Internal

outside_access_in tcp allowed access list any interface outside eq smtp

outside_access_in tcp allowed access list any interface outside eq www

outside_access_in tcp allowed access list any interface outside eq https

inside_outbound_nat0_acl ip access list allow any 192.168.2.0 255.255.255.224

permit 192.168.1.0 ip access list inside_outbound_nat0_acl 255.255.255.0 Barbado

permit 192.168.1.0 ip access list inside_outbound_nat0_acl 255.255.255.0 Data_Ce

permit 192.168.1.0 ip access list outside_cryptomap_20 255.255.255.0 Barbados 25

permit 192.168.1.0 ip access list outside_cryptomap_40 255.255.255.0 Data_Center

pager lines 24

opening of session

debug logging in buffered memory

logging trap information

logging out of the 190.213.57.203 host

Outside 1500 MTU

Within 1500 MTU

external IP 190.213.57.203 255.255.255.0

IP address inside 192.168.1.1 255.255.255.0

IP verify reverse path to the outside interface

alarm action IP verification of information

alarm action attack IP audit

IP local pool vpn_pool 192.168.2.0 - 192.168.2.20

no failover

failover timeout 0:00:00

failover poll 15

No IP failover outdoors

No IP failover inside

PDM location lexmailserver 255.255.255.255 outside

location of PDM Lextt-ms 255.255.255.255 outside

location of PDM 192.168.2.0 255.255.255.224 outside

location of PDM 200.50.87.198 255.255.255.255 outside

PDM location Barbados 255.255.255.0 inside

location of PDM 255.255.255.255 Lextt-SF on the inside

PDM location 255.255.255.0 outside Barbados

location of PDM 255.255.255.255 Lextt-ms on the inside

location of PDM Data_Center_Internal 255.255.255.0 outside

PDM 100 logging alerts

history of PDM activate

ARP timeout 14400

Global interface 10 (external)

NAT (inside) 0-list of access inside_outbound_nat0_acl

NAT (inside) 10 192.168.1.0 255.255.255.0 0 0

public static tcp (indoor, outdoor) interface smtp smtp Lextt-SF netmask 255.255.255.255

public static tcp (indoor, outdoor) interface www Lextt-ms www netmask 255.255.255.255 0

public static tcp (indoor, outdoor) interface Lextt-ms https netmask 255.255.255.2 https

Access-group outside_access_in in interface outside

Route outside 0.0.0.0 0.0.0.0 190.213.73.1 1

Timeout xlate 03:00

Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225

H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00

Timeout, uauth 0:05:00 absolute

GANYMEDE + Protocol Ganymede + AAA-server

AAA-server GANYMEDE + 3 max-failed-attempts

AAA-server GANYMEDE + deadtime 10

RADIUS Protocol RADIUS AAA server

AAA-server RADIUS 3 max-failed-attempts

AAA-RADIUS deadtime 10 Server

AAA-server local LOCAL Protocol

AAA authentication enable LOCAL console

the ssh LOCAL console AAA authentication

Enable http server

http 192.168.1.0 255.255.255.0 inside

Barbados 255.255.255.0 HTTP inside

No snmp server location

No snmp Server contact

SNMP-Server Community public

No trap to activate snmp Server

enable floodguard

Permitted connection ipsec sysopt

Sysopt connection permit-pptp

Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

outside_map 20 ipsec-isakmp crypto map

card crypto outside_map 20 match address outside_cryptomap_20

peer set card crypto outside_map 20 200.50.87.198

outside_map card crypto 20 the transform-set ESP-DES-MD5 value

outside_map 40 ipsec-isakmp crypto map

card crypto outside_map 40 correspondence address outside_cryptomap_40

peer set card crypto outside_map 40 63.143.77.114

outside_map card crypto 40 the transform-set ESP-DES-MD5 value

outside_map interface card crypto outside

ISAKMP allows outside

ISAKMP key * address 200.50.87.198 netmask 255.255.255.255

ISAKMP key * address 63.143.77.114 netmask 255.255.255.255

part of pre authentication ISAKMP policy 20

encryption of ISAKMP policy 20

ISAKMP policy 20 md5 hash

20 2 ISAKMP policy group

ISAKMP duration strategy of life 20 86400

Telnet timeout 5

If you haven't already done so, you must clear the SAs Phase I on both sides after you make a change to the map.  Once the Phase I SA has been cleared, he renegotiate and reset Phase II.  If you alerady made this, the only other thing I can think is manually re-enter the secrets disclosed in advance on tunnel groups then erase both the Phase I and Phase II SAs.

Tags: Cisco Security

Similar Questions

  • VPN site to Site - ASA to PIX - same subnet on the inside

    Chaps,

    I have a unusual scenario, whereby case I need a tunnel vpn site-to-site between a pix of cisco version 7 and version 8 cisco asa, which have the same subnet ip to each endpoint.  Is it possible to create such a tunnel from site to site or do I change one of the remote endpoints?

    Thank you

    Nick

    Hi Nicolas,.

    To allow the traffic through the tunnel when having the same at both ends addressing scheme, you should NAT VPN traffic.

    That is to say.

    Site a 10.1.1.0/24 LAN

    Site B LAN 10.1.1.0/24

    The site config:

    NAT permit list to access ip 10.1.1.0 255.255.255.0 192.168.2.0 255.255.255.0

    (in, out) static 192.168.1.0 access-list NAT

    license of crypto list to access ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

    Site B config:

    NAT permit list to access ip 10.1.1.0 255.255.255.0 192.168.1.0 255.255.255.0

    (in, out) static 192.168.2.0 access-list NAT

    license of crypto list to access ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0

    The idea is that Site A will to 192.168.1.0 translatefd when you go to Site B, and Site B will result to 192.168.2.0 when you go to the Site A.

    Hope that makes sense.

    Federico.

  • Problem with IPsec VPN between ASA and router Cisco - ping is not response

    Hello

    I don't know because the IPsec VPN does not work. This is my setup (IPsec VPN between ASA and R2):

    my network topology data:

    LAN 1 connect ASA - 1 (inside the LAN)

    PC - 10.0.1.3 255.255.255.0 10.0.1.1

    ASA - GigabitEthernet 1: 10.0.1.1 255.255.255.0

    -----------------------------------------------------------------

    ASA - 1 Connect (LAN outide) R1

    ASA - GigabitEthernet 0: 172.30.1.2 255.255.255.252

    R1 - FastEthernet 0/0: 172.30.1.1 255.255.255.252

    ---------------------------------------------------------------------

    R1 R2 to connect

    R1 - FastEthernet 0/1: 172.30.2.1 255.255.255.252

    R2 - FastEthernet 0/1: 172.30.2.2 255.255.255.252

    R2 for lan connection 2

    --------------------------------------------------------------------

    R2 to connect LAN2

    R2 - FastEthernet 0/0: 10.0.2.1 255.255.255.0

    PC - 10.0.2.3 255.255.255.0 10.0.2.1

    ASA configuration:

    1 GigabitEthernet interface
    nameif inside
    security-level 100
    IP 10.0.1.1 255.255.255.0
    no downtime
    interface GigabitEthernet 0
    nameif outside
    security-level 0
    IP 172.30.1.2 255.255.255.252
    no downtime
    Route outside 0.0.0.0 0.0.0.0 172.30.1.1

    ------------------------------------------------------------

    access-list scope LAN1 to LAN2 ip 10.0.1.0 allow 255.255.255.0 10.0.2.0 255.255.255.0
    object obj LAN
    subnet 10.0.1.0 255.255.255.0
    object obj remote network
    10.0.2.0 subnet 255.255.255.0
    NAT (inside, outside) 1 static source obj-local obj-local destination obj-remote control remote obj non-proxy-arp static

    -----------------------------------------------------------
    IKEv1 crypto policy 10
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 3600
    Crypto ikev1 allow outside
    crypto isakmp identity address

    ------------------------------------------------------------
    tunnel-group 172.30.2.2 type ipsec-l2l
    tunnel-group 172.30.2.2 ipsec-attributes
    IKEv1 pre-shared-key cisco123
    Crypto ipsec transform-set esp-aes-192 ASA1TS, esp-sha-hmac ikev1

    -------------------------------------------------------------
    card crypto ASA1VPN 10 is the LAN1 to LAN2 address
    card crypto ASA1VPN 10 set peer 172.30.2.2
    card crypto ASA1VPN 10 set transform-set ASA1TS ikev1
    card crypto ASA1VPN set 10 security-association life seconds 3600
    ASA1VPN interface card crypto outside

    R2 configuration:

    interface fastEthernet 0/0
    IP 10.0.2.1 255.255.255.0
    no downtime
    interface fastEthernet 0/1
    IP 172.30.2.2 255.255.255.252
    no downtime

    -----------------------------------------------------

    router RIP
    version 2
    Network 10.0.2.0
    network 172.30.2.0

    ------------------------------------------------------
    access-list 102 permit ahp 172.30.1.2 host 172.30.2.2
    access-list 102 permit esp 172.30.1.2 host 172.30.2.2
    access-list 102 permit udp host 172.30.1.2 host 172.30.2.2 eq isakmp
    interface fastEthernet 0/1
    IP access-group 102 to

    ------------------------------------------------------
    crypto ISAKMP policy 110
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 42300

    ------------------------------------------------------
    ISAKMP crypto key cisco123 address 172.30.1.2

    -----------------------------------------------------
    Crypto ipsec transform-set esp - aes 128 R2TS

    ------------------------------------------------------

    access-list 101 permit tcp 10.0.2.0 0.0.0.255 10.0.1.0 0.0.0.255

    ------------------------------------------------------

    R2VPN 10 ipsec-isakmp crypto map
    match address 101
    defined by peer 172.30.1.2
    PFS Group1 Set
    R2TS transformation game
    86400 seconds, life of security association set
    interface fastEthernet 0/1
    card crypto R2VPN

    I don't know what the problem

    Thank you

    If the RIP is not absolutely necessary for you, try adding the default route to R2:

    IP route 0.0.0.0 0.0.0.0 172.16.2.1

    If you want to use RIP much, add permissions ACL 102:

    access-list 102 permit udp any any eq 520

  • Just did my laptop, tried to do windows updates and get a message T "here has been a problem the site witt" and can not open the page I requested at this time.

    Just, I redid my laptop using my system recovery disks. I went to windows update and get this msg when I click on Express.com: the site has encountered a problem and cannot display the page you are trying to view.

    Original title: I redid all my laptop. I went to windows update and get a message that says: there was a problem witht the site and I wanted that the pag can not open the page I have requessted at this time.

    You must download and install Windows XP Service Pack 2 (if not already installed) followed in Windows XP Service Pack 3.  You will find two of them at http://www.microsoft.com/downloads - download the "Network Installation Package" for the two and ignore the part about them being only for the professionals - the parcel I recommend you download will install with or without network connection.

  • Unable to connect to 2 sites: craigslist and google

    A few months ago, my upload has begun to slow down. Finally, 2 sites: www.craigslist.com and www.google.com would not at all. I've tried 3 browsers and none will have access to these 2 sites.

    Glad it works again and thanks for posting back.

    Unfortunately if the problem should recur is a problem of detention and they are the may be the most difficult kind of problem to understand.

    Now may be a good time to review your backup and recovery strategies.

  • VPN site to site ASA and SSL VPN

    Hello

    Already configured vpn site to site for both sites. Now, I try to configure vpn remote access to one site.

    But I'm starting to config some command like below to access remote vpn, the existing site-to-site vpn disconnected auto.

    No crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto-map dynamic outside_dyn_map 20 the value transform-set ESP-3DES-SHA

    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map

    outside_map interface card crypto outside

    Please, help me to check.

    Thank you

    Ko Htwe

    Hello

    You can have a single card encryption for an interface, you must configure both tunnels (access site to & remote) in a single card with number of different sequesnce encryption. Please make sure that the sequence number for the remote access is higher than for the site to site.

    You can also get this back to the config command, why did you remove it.

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    If you still have a problem, please let us know the configuration.

    Kind regards

    Mohammad

  • IPSEC VPN from Site to Site - NAT problem with address management

    Hi all

    I have two Cisco ASA 5505 performing of IPSEC Site to Site VPN. All traffic inside each firewall through the VPN tunnel and I have full connectivity. From site A, I can connect to the inside address of the ASA at the site B and launch of the ASDM or SSH, etc.

    The problem I have is when I'm logged on the ASA site B management traffic is given the external address. I created this as interesting traffic to get it to go through the VPN but I need to use the inside address of ASA B. The following is possible:

    • If I can make the ASA Site B to use inside interface as its address management (I already have management access to the inside Interface)
    • I have NAT can address external interfaces to Site B before moving through the VPN tunnel management traffic so that it appears to come from Site B inside the address
    • I can NAT VPN traffic as it appears in the Site A for management traffic to Site B on the right address.

    The problem is that my PRACTICE Please also come from this address and I need the application before being on an internal address to even if my CA.

    Thanks for any help.

    Ian

    Thanks, I understand what you are trying to achieve now.

    However, I think that I don't have good news for you. Unfortunately PEIE request can be initiated of the SAA within the interface, as there is no option to start the query from the inside interface. With other features of management such as AAA, logging, you have an option to specify what ASA desired originally to demand from interface, but CEP doesn't have this option.

    Here's how you can configure under the trustpoint crypto, but unfortunately by specifying the interface doesn't not part of option:

    http://www.Cisco.com/en/us/docs/security/ASA/asa84/command/reference/C5.html#wp2262210

  • G-72 laptop HP: network connection problems

    Hello: I have no internet connection. Here's what I know: unidentified network no internet access. Wireless LAN, Microsoft Virtual WiFi Miniport Adapter. In addition, all security settings are OFF. This has just begun. I have no explanation. Any help is appreciated. Thank you... M.

    Hi there @MesaRey,

    I understand that your computer is no longer connected to the internet. I'm happy to help you with this. Please report the number of complete product for your laptop. Check out the following, if you need assistance with this information. How can I find my model number or product number?

    If other devices are connected and the only one having trouble is your laptop, then you can try a system restore, just in case there is a change to your system. Select a restore point before the problem started and test the connection.

    Using Microsoft System Restore (Windows 7)

    The following pages are useful for troubleshooting wireless connectivity problems.
    Troubleshooting your wireless network and Internet access (Windows 7)

    In addition, you can watch the the power management of your wireless adapter:
    Turn off the power to the adapter:
    1. open Device Manager. (Win Key + R > type devmgmt.msc > OK)
    2. expand the network adapters.
    3. right click on the Ethernet adapter / wireless, and then click Properties.
    4. click on the power management tab.
    5 remove the check mark next to allow the computer to turn off this device to save power.
    6. click on OK.
    7 test cycle.

    Forget a network (Windows Vista)
    1. start network and sharing Center.
    2. in the pane tasks, click on manage wireless networks.
    3. right click on the connection that you want to delete and then click on remove network.
    4. in wireless networks handle - warning dialog box, click OK.
    5. the connection is removed from the list of wireless connections that you can view or edit.

    Forget the network: (Windows 7)
    1. press start.
    2. tap manage wireless networks, click on the application at the top of the start menu.
    3. right click on the network, and then click on remove network.
    4 confirm the warning by clicking OK.

    Forget the network: (Windows 8)
    1. press Windows Key + C
    2. click on settings.
    3. click on change PC settings.
    4. click on network on the left.
    5. click on manage known networks.
    6. click on the name of the network.
    7. click on forget.

    Reset TCP/IP on your PC:
    1. go to your start screen/menu and type CMD.
    2. right-click on the command prompt icon and select run as administrator.
    3. in the window that opens type "netsh int ip reset resetlog.txt" without the quotes and press ENTER.
    4 restart your PC and test.

    It can also help to reset the winsock catalog:
    1. go to your start screen/menu and type CMD.
    2. right-click on the command prompt icon and select run as administrator.
    3. in the window that opens type "netsh winsock reset" without the quotes, and then press ENTER.
    4 restart your PC and test.

    Reinstall the NIC drivers:
    1. download the drivers from here, but do not run them again.
    2. go to your Start menu/screen and type Device Manager.
    3. expand network adapters.
    4. right click on the wireless adapter and choose uninstall.
    5 install the drivers downloaded in step 1.
    6. restart your PC and test.

  • Pavillion G6 2014tx: wireless connectivity problems

    Since the last 2-3 months, my wireless connection does not work correctly. This happened right after that I did the partitioning in the D drive (I don't think this is the main cause). What is happening is that, all of a sudden when internet does not bar shows signs of yellow warning and 'tells' LIMITED ACCESS wireless network. When I try to solve problems, it will give no problem. Then in Device Manager, I tried to uninstall and install again, the internet worked for a while, and still the same problem occurs. When I tried to call to the service center, they told me that I have to buy CDs to retrieve a value of rs500 because I did not these recovery disks. I'm in serious trouble please help...

    I also tried to update latest driver frm net, even if the problem does not get resolved. I also tried to reset the TCPIP in cmd prompt, but it worked for 2-3 days and still the same problem happened...

    Hi there @Parthsagar2010

    Welcome to the Forums of HP Support! It's a good place to find the help you need, so many other users, the HP experts and other members of the support staff.

    I understand that you are having problems with your wireless connection, and I am happy to help you with this.

    I realize that you mentioned the update of your driver from the internet, but just in case, here is the page drivers. There are several pilots possible depending on what card you have.

    HP Pavilion g6-2014tx Notebook PC - software & drivers

    The following pages are useful for troubleshooting wireless connectivity problems.
    Troubleshooting your wireless network and Internet access (Windows 7)

    In addition, you can watch the the power management of your wireless adapter:
    Turn off the power to the adapter:
    1. open Device Manager. (Win Key + R > type devmgmt.msc > OK)
    2. expand the network adapters.
    3. right click on the Ethernet adapter / wireless, and then click Properties.
    4. click on the power management tab.
    5 remove the check mark next to allow the computer to turn off this device to save power.
    6. click on OK.
    7 test cycle.

    Forget the network: (Windows 7)
    1. press start.
    2. tap manage wireless networks, click on the application at the top of the start menu.
    3. right click on the network, and then click on remove network.
    4 confirm the warning by clicking OK.

    Reset TCP/IP on your PC:
    1. go to your start screen/menu and type CMD.
    2. right-click on the command prompt icon and select run as administrator.
    3. in the window that opens type "netsh int ip reset resetlog.txt" without the quotes and press ENTER.
    4 restart your PC and test.

    It can also help to reset the winsock catalog:
    1. go to your start screen/menu and type CMD.
    2. right-click on the command prompt icon and select run as administrator.
    3. in the window that opens type "netsh winsock reset" without the quotes, and then press ENTER.
    4 restart your PC and test.

    Reinstall the NIC drivers:
    1. download the drivers from here, but do not run them again.
    2. go to your Start menu/screen and type Device Manager.
    3. expand network adapters.
    4. right click on the wireless adapter and choose uninstall.
    5 install the drivers downloaded in step 1.
    6. restart your PC and test.

    Test an ethernet connection:
    Explicit. Test if the problem persists on a wired connection to the adapter hardware troubleshooting wireless can be directed to the appropriate areas.

    Test another connection:
    Many people excluded their home network as a problem if another device working on the same network. Networking is not as simple as that. Each device interacts differently with your router or modem and it is impossible to exclude the settings for this device until the laptop has been tested on another network.

  • VPN between ASA and cisco router [phase2 question]

    Hi all

    I have a problem with IPSEC VPN between ASA and cisco router

    I think that there is a problem in the phase 2

    Can you please guide me where could be the problem.
    I suspect questions ACL on the router, but I cannot fix. ACL on the router is specified below

    Looking forward for your help

    Phase 1 is like that

    Cisco_router #sh crypto isakmp his

    IPv4 Crypto ISAKMP Security Association
    status of DST CBC State conn-id slot
    78.x.x.41 87.x.x.4 QM_IDLE 2006 0 ACTIVE

    and ASA

    ASA # sh crypto isakmp his

    ITS enabled: 1
    Generate a new key SA: 0 (a tunnel report Active 1 and 1 to generate a new key during the generate a new key)
    Total SA IKE: 1

    1 peer IKE: 78.x.x.41
    Type: L2L role: initiator
    Generate a new key: no State: MM_ACTIVE

    Phase 2 on SAA

    ASA # sh crypto ipsec his
    Interface: Outside
    Tag crypto map: Outside_map, seq num: 20, local addr: 87.x.x.4

    Outside_cryptomap_20 ip 172.19.209.0 access list allow 255.255.255.0 172.
    19.194.0 255.255.255.0
    local ident (addr, mask, prot, port): (172.19.209.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (172.19.194.0/255.255.255.0/0/0)
    current_peer: 78.x.x.41

    #pkts program: 8813, #pkts encrypt: 8813, #pkts digest: 8813
    #pkts decaps: 0, #pkts decrypt: 0, #pkts check: 0

    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 8813, model of #pkts failed: 0, #pkts Dang failed: 0
    #send errors: 0, #recv errors: 0

    local crypto endpt. : 87.x.x.4, remote Start crypto. : 78.x.x.41

    Path mtu 1500, fresh ipsec generals 58, media, mtu 1500
    current outbound SPI: C96393AB

    SAS of the esp on arrival:
    SPI: 0x3E9D820B (1050509835)
    transform: esp-3des esp-md5-hmac no
    running parameters = {L2L, Tunnel}
    slot: 0, id_conn: 7, crypto-card: Outside_map
    calendar of his: service life remaining (KB/s) key: (4275000/3025)
    Size IV: 8 bytes
    support for replay detection: Y
    outgoing esp sas:
    SPI: 0xC96393AB (3378746283)
    transform: esp-3des esp-md5-hmac no
    running parameters = {L2L, Tunnel}
    slot: 0, id_conn: 7, crypto-card: Outside_map
    calendar of his: service life remaining (KB/s) key: (4274994/3023)
    Size IV: 8 bytes
    support for replay detection: Y

    Phase 2 on cisco router

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (172.19.209.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (172.19.194.0/255.255.255.0/0/0)
    current_peer 87.x.x.4 port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: encrypt 0, #pkts: 0, #pkts digest: 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts check: 0
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    Errors #send 0, #recv 0 errors

    local crypto endpt. : 78.x.x.41, remote Start crypto. : 87.x.x.4
    Path mtu 1452, ip mtu 1452, ip mtu BID Dialer0
    current outbound SPI: 0x0 (0)

    SAS of the esp on arrival:

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:

    outgoing ah sas:

    outgoing CFP sas:

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (172.19.194.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (172.19.209.0/255.255.255.0/0/0)
    current_peer 87.x.x.4 port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: encrypt 0, #pkts: 0, #pkts digest: 0
    #pkts decaps: 8947, #pkts decrypt: 8947, #pkts check: 8947

    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    Errors #send 0, #recv 0 errors

    local crypto endpt. : 78.x.x.41, remote Start crypto. : 87.x.x.4
    Path mtu 1452, ip mtu 1452, ip mtu BID Dialer0
    current outbound SPI: 0x3E9D820B (1050509835)

    SAS of the esp on arrival:
    SPI: 0xC96393AB (3378746283)
    transform: esp-3des esp-md5-hmac.
    running parameters = {Tunnel}
    Conn ID: 29, flow_id: Motorola SEC 1.0:29, card crypto: mycryptomap
    calendar of his: service life remaining (k/s) key: (4393981/1196)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0x3E9D820B (1050509835)
    transform: esp-3des esp-md5-hmac.
    running parameters = {Tunnel}
    Conn ID: 30, flow_id: Motorola SEC 1.0:30, card crypto: mycryptomap
    calendar of his: service life remaining (k/s) key: (4394007/1196)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE

    outgoing ah sas:

    outgoing CFP sas:

    VPN configuration is less in cisco router

    access-list 101 permit ip 172.19.194.0 0.0.0.255 172.19.206.0 0.0.0.255 connect
    access-list 101 permit ip 172.19.206.0 0.0.0.255 172.19.194.0 0.0.0.255 connect
    access-list 101 permit ip 172.19.194.0 0.0.0.255 172.19.203.0 0.0.0.255 connect
    access-list 101 permit ip 172.19.203.0 0.0.0.255 172.19.194.0 0.0.0.255 connect
    access-list 101 permit ip 172.19.194.0 0.0.0.255 172.19.209.0 0.0.0.255 connect
    access-list 101 permit ip 172.19.209.0 0.0.0.255 172.19.194.0 0.0.0.255 connect

    access-list 105 deny ip 172.19.194.0 0.0.0.255 172.19.206.0 0.0.0.255 connect
    access-list 105 deny ip 172.19.206.0 0.0.0.255 172.19.194.0 0.0.0.255 connect
    access-list 105 deny ip 172.19.194.0 0.0.0.255 172.19.203.0 0.0.0.255 connect
    access-list 105 deny ip 172.19.203.0 0.0.0.255 172.19.194.0 0.0.0.255 connect
    access-list 105 deny ip 172.19.194.0 0.0.0.255 172.19.209.0 0.0.0.255 connect
    access-list 105 deny ip 172.19.209.0 0.0.0.255 172.19.194.0 0.0.0.255 connect

    sheep allowed 10 route map
    corresponds to the IP 105

    Crypto ipsec transform-set esp-3des esp-md5-hmac mytransformset

    mycryptomap 100 ipsec-isakmp crypto map
    the value of 87.x.x.4 peer
    Set transform-set mytransformset
    match address 101

    crypto ISAKMP policy 100
    BA 3des
    md5 hash
    preshared authentication
    Group 2
    ISAKMP crypto key xxx2011 address 87.x.x.4

    Your permit for 105 ACL statement should be down is changed to match because it is the most general ACL.

    You currently have:

    Extend the 105 IP access list
    5 permit ip 172.19.194.0 0.0.0.255 (18585 matches)
    10 deny ip 172.19.194.0 0.0.0.255 172.19.206.0 0.0.0.255 connect
    30 deny ip 172.19.194.0 0.0.0.255 172.19.203.0 0.0.0.255 connect
    50 deny ip 172.19.194.0 0.0.0.255 172.19.209.0 0.0.0.255 connect

    It should be:

    Extend the 105 IP access list
    10 deny ip 172.19.194.0 0.0.0.255 172.19.206.0 0.0.0.255 connect
    30 deny ip 172.19.194.0 0.0.0.255 172.19.203.0 0.0.0.255 connect
    50 deny ip 172.19.194.0 0.0.0.255 172.19.209.0 0.0.0.255 connect

    IP 172.19.194.0 allow 60 0.0.0.255 (18585 matches)

    To remove it and add it to the bottom:

    105 extended IP access list

    not 5

    IP 172.19.194.0 allow 60 0.0.0.255 any

    Then ' delete ip nat trans. "

    and it should work now.

  • Unable to connect to a site web - says Adobe Flash Player and JavaScript problem

    For more than a year, my daughter was able to use the Web site for children for the lively game. Ago about a week after it has loaded the site and clicked on "Let's play", instead of check-in at the login screen, she received the following message - "to view this content, you must activate JavaScript and you need the latest version of Adobe Flash Player. I found this confusing, because we all software up to date. But, just in case where I did everything he said... still no results. I then contacted the web site support and they recommended I uninstall Adobe software and reinstall it. They sent me specific links from Firefox to do. Always without success. I don't know if some updates have taken place in the last week that may have caused this problem with the web site, but it's very frustrating for us. In addition, we are able to connect (as we used to be able to) on IE, but we love Firefox - Please HELP! One last thing, I am also unable to open web site to my work computer, which also uses Firefox. I'm a fool to the computer, so I would need instruction step by step... Thank you!!!

    URL of affected sites

    http://www.ClubPenguin.com

    I had the same problem and it goes back to AdBlock. Once I disabled that, Club Penguin loaded well again.

  • ASA 5505 AnyConnect 8.2 connect other subnets from site to site

    Hello

    I'm somehwat new Cisco and routing. I have an installation of two ASA 5505 that are configured for the site to site vpn and AnyConnect. The AnyConnect subnet can connect to inside VLANs to the SiteA but I can't for the remote to Site B subnet when you use AnyConnect. Any ideas? I have to add the subnet of 10.0.7.0/24 to the site to site policy? Do I need to set up several NAT rules? Details below.

    Site A: ASA 5505 8.2

    Outside: 173.X.X.X/30

    Inside: 10.0.5.0/24

    AnyConnect: 10.0.7.0/24

    Site b: ASA 5505 8.2

    Outsdie: 173.X.X.X/30

    Inside: 10.0.6.0/24

    The AnyConnect subnet cannot access the network of 10.0.6.0/24.

    Any help would be greatly appreciated! Thank you!

    Hello Kevin,

    You must go back to identity (outdoors, outdoor) identity NAT (essentially for two subnets (Anyconnect and Remote_IPSec).

    And of course to include traffic in the ACL for IPSec crypto and (if used) split with the Anyconnect tunnel.

    Note all useful posts!

    Kind regards

    Jcarvaja

    Follow me on http://laguiadelnetworking.com

  • No Ping response from Site to Site connection between 876 of Cisco and CheckPoint Firewall

    Hello!

    We try to create a Site-to-Site - connection IPSec between a Cisco 876 (local site) and a control-firewall station (remote site). Cisco 876 is not directly connected to the internet, but it is behind a router ADSL with port-forwarding, redirection of ports 500 and 4500. The configuration of the Cisco 876 running is attached to this thread. Unfortunately, I get no results when debugging the connection with the command "debug crypto isakmp" and "debug crypto ipsec".

    From the point of view of Checkpoint firewall the connection seems to be implemented, but there is no response from ping.

    The server in the local site to be achieved since the network behind the firewall Checkpoint has a routing entry "PEI route add [inside the ip-net Remote] 255.255.255.0 [inside the premises of intellectual property]" (see also annex current config name ip addresses).

    Establishing a VPN Cisco Client connection to the same router Cisco 876 works very well.

    Any help would be much appreciated!

    Jakob J. Blaette

    Hi Jakob,

    Add my two cents here.

    You should always verify that the following ports and Protocol are open:

    1 - UDP port 500--> ISAKMP

    2 - UDP port 4500--> NAT - T

    3-protocol 50---> ESP

    A LAN-to-LAN tunnel will never establish a TCP session, but it could use NAT - T (if behind a NAT). Remember that a single translation isn't a port forwarding, a LAN-to-LAN tunnel is not good unless you have a one-to-one translation of the NATted device, which I think, in your case the router is working.

    HTH.

    Portu.

    Please note all useful messages and mark this message as a response.

  • How to end a vpn connection from site to site on ASA 5510

    Hi guys,.

    I would like to know if there is a command that I can use to break a connection from site to site and restart it whenever I want.

    I don't want to use the close command since I use the specific interface as an exit point on the internet.

    In this case, you can configure just one incomplete crypto map entry, for example: just keep 'peers set' not configured until you establish the vpn tunnel, and then add the command "set by the peers.

    If you disable the tunnel, just remove the 'set by the peers' command for this particular VPN tunnel.

  • Firefox 4 b 7 is not remembering my automatic connection settings. I connect on a site and after that I have restart the browser, I need to re connect. It is very annoying. What is the problem?

    Any site, after I close and reopen the browser, it automatically connect.

    • Websites to remember you and automatically log you in are stored in a cookie.
    • You need a cookie exception allow (Tools > Options > privacy > Cookies: Exceptions) to keep this cookie, especially for secure Web sites and if we let the cookies expire when Firefox closes
    • Make sure that you do not remove the navigation, search and download history on Firefox to clear 'Cookies' and 'Site preferences.
    • Make sure that you do not run Firefox in private - browsing using Firefox without saving the story mode (permanent)

Maybe you are looking for