remote access vpn broke after moving to 7.2.1

Unanswered Question
Dec 11th, 2007

I had PIX515E Restricted with three interfaces running at 7.0.6. Had a L2L VPN and a couple remote access VPN tunnels operating on this PIX.

I replaced the PIX with another PIX515E unrestricted with more interfaces. This replacement PIX runs at v7.2.1. I tftped the config from the old pix over and added the new interfaces and their corresponding ACLs.

Everything worked fine including the L2L tunnel, except for the remote access vpn. As soon as the IKE phase one finished and user authenticated, the Pix dropps the connection. VPN client is v.4.6.03.

I tried removing all RA VPN commands and started over. Tried simplifying the authentication from RADIUS to just local user. Tried usnig ASDM and its VPN wizard to remove and config the RA. It had problem removing and applying the VPN statements, though web console user is given priv level 15. I had to manually implement commands generated in ASDM wizard. Nothing worked.

Please see attachment for detailed PIX debug log.


" Attempted to assign network or broadcast IP address, removing ( from pool.

Dec 06 16:15:44 [IKEv1 DEBUG]: Group = IT-VPN, Username = brazos, IP =, IKE TM V6

FSM error history (struct &0x2570f68) <state>, <event>: TM_DONE, EV_ERROR-->TM_BLD_REPLY,



Dec 06 16:15:44 [IKEv1 DEBUG]: Group = IT-VPN, Username = brazos, IP =, IKE AM

Responder FSM error history (struct &0x2b8dd80) <state>, <event>: AM_DONE, EV_ERROR--




Dec 06 16:15:44 [IKEv1 DEBUG]: Group = IT-VPN, Username = brazos, IP =

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
mchin345 Tue, 12/18/2007 - 09:37

delete the registery entry and reinstall the vpn client and try again

DANIEL WANG Tue, 12/18/2007 - 10:20

The problem is verified on 4 computers with different versions of cisco vpn client, including and

Thanks for taking the time to reply.

VictorAKur Wed, 12/19/2007 - 08:24


what transform set are you using for the remote access connections?

For example Cisco VPN clients don't work with DES-SHA on ASA, it has to be DES-MD5 or 3DES-SHA (3DES-MD5). May be it is something silmillar in your case?

DANIEL WANG Wed, 12/19/2007 - 12:46

This is what my current one (created by ASDM) looks like:

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA

This is what my old one looked like (CLI)

crypto ipsec transform-set MEDIUM esp-3des esp-md5-hmac

crypto dynamic-map dyn-vpn 4 set transform-set MEDIUM

DANIEL WANG Thu, 12/20/2007 - 09:07

Sorry I had a CCO account problem. Here is the VPN client log. The log exceeds the limit. I attached it the post.

This profile is using NAT-T. I also tried just IPSec with similar results. There is no other firewall/proxy in between.


This Discussion