below is my setup.
business class dsl modem with a static ip (188.8.131.52) connects to a asa5510.
the isp provided me another static routable ip for the asa5510 and I configured the 5510 outside interface with this (184.108.40.206).
I also have couple of machines behind the inside interface of the 5510. (172.16.1.0)
All i want to do is let some ppl vpn into the inside network to do some troubleshooting.
I don't need anyone from the inside to access the net, so no nat needed.
I went through the normal vpn config and the remote vpn wizard.
however, using the cisco vpn client, i'm unable to log in.
I can ping the 220.127.116.11 interface but cannot vpn in.
I think there is no path from 18.104.22.168 to 22.214.171.124
The group name should be EAT which is configured on the tunnel-group parameters in your ASA. It should not be "vgoradia" but what is configured on the ASA.
And the password should be the one that you have configured under the tunnel-group parameter for pre-shared key.
tunnel-group EAT type ipsec-ra
tunnel-group EAT general-attributes
tunnel-group EAT ipsec-attributes
Let me know how this pans out.
Rate this post, if it helps.