Hope somebody can help. I'm trying to use a new ASA 5520 to terminate my remote access VPN's. The remote clients use the cisco VPN client V5. I'm using the configuration below and testing using a laptop directly connected into the same VLAN as the outside interface. I can ping the outside interface, but when I try to connect using the client I get Error 412: Peer not responding. Debugging ISAKMP on the ASA shows no attempt to connect. The laptop will connect to our existing VPN without a problem.
Does anyone have any ideas that may help me out.
boot system disk0:/asa722-k8.bin
ftp mode passive
dns server-group DefaultDNS
access-list 101 extended permit tcp any host *eq https
access-list 101 extended permit tcp any host * eq smtp
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu dmz 1500
mtu management 1500
ip local pool pool 192.168.0.10-192.168.0.15
failover lan unit primary
failover lan interface failover GigabitEthernet0/3
failover key *****
failover link failover GigabitEthernet0/3
failover interface ip failover 192.168.20.1 255.255.255.0 standby 192.168.20.2
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :