cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
9309
Views
5
Helpful
22
Replies

ASA 5510 remote access VPN

Ali Bahnam
Level 1
Level 1

Dears,

Good day,

Please I need your support on the following issue:-

I had configured remote access vpn on ASA 5510  as shwon on the attached configuration file.

The problem is when I'm trying to connect via cisco vpn client I got this error (secure vpn connection terminated locally by the client error 412)

Please can you support me in this issue.

Regards,

ASA Version 8.2(1)
!
hostname Active-ASA
enable password iwtL1y5uEVzS9Gp9 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Ethernet0/0
nameif outside
security-level 50
ip address 10.11.13.3 255.255.255.0 standby 10.11.13.4
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.4.2 255.255.255.0 standby 192.168.4.3
!
interface Ethernet0/2
description LAN Failover Interface
!
interface Ethernet0/3
shutdown
no nameif
security-level 50
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
!
boot system disk0:/824-k8.bin
boot system disk0:/824-k8.
boot system disk0:/asa821-k8.bin
ftp mode passive
access-list internal extended permit ip any any
access-list internal extended permit icmp any any
access-list internal extended permit udp any any eq isakmp
access-list internal extended permit udp any any eq 62515
access-list internal extended permit tcp any any
access-list internal extended permit udp any any eq 4500
access-list external extended permit icmp any any
access-list external extended permit ip any any
access-list external extended permit udp any any eq 62515
access-list external extended permit udp any any eq isakmp
access-list external extended permit tcp any any
access-list external extended permit udp any any eq 4500
access-list nat0 extended permit ip 192.168.4.0 255.255.255.0 192.168.77.0 255.
55.255.0
access-list nat0 extended permit ip 192.168.5.0 255.255.255.0 192.168.77.0 255.
55.255.0
access-list nat0 extended permit ip 10.11.13.0 255.255.255.0 192.168.77.0 255.2
5.255.0
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu management 1500
ip local pool babylon 192.168.77.1-192.168.77.33 mask 255.255.255.0
failover
failover lan unit primary
failover lan interface failover Ethernet0/2
failover interface ip failover 10.8.8.1 255.255.255.252 standby 10.8.8.2
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list nat0
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) 192.168.0.0 192.168.0.0 netmask 255.255.0.0
access-group internal in interface outside
access-group external in interface inside
route outside 0.0.0.0 0.0.0.0 10.11.13.100 1
route inside 192.168.5.0 255.255.255.0 192.168.4.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
service resetoutside
crypto ipsec transform-set test esp-des esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map bmap 10 set transform-set test
crypto dynamic-map bmap 10 set security-association lifetime seconds 288000
crypto dynamic-map bmap 10 set reverse-route
crypto map smap 10 ipsec-isakmp dynamic bmap
crypto map smap interface outside
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
telnet 0.0.0.0 0.0.0.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
group-policy client internal
group-policy client attributes
vpn-simultaneous-logins 20
default-domain value babylon.com
user-authentication-idle-timeout none
username omar password Hu6b8CXoHv4DUaaV encrypted privilege 15
tunnel-group client type remote-access
tunnel-group client general-attributes
address-pool babylon
default-group-policy client
tunnel-group client ipsec-attributes
pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:036b2f438b954f6aa8a5dd9286dcf66d
: end
Active-ASA#

22 Replies 22

Also missing the split tunnel policy:

access-list split-acl permit 192.168.4.0 255.255.255.0

access-list split-acl permit 192.168.5.0 255.255.255.0

access-list split-acl permit 10.11.13.0 255.255.255.0

group-policy client attributes

  split-tunnel-policy tunnelspecified

  split-tunnel-network-list value split-acl

I added the split tunneling but the same issue as shown in the below debug:-

Active-ASA# May 29 03:13:42 [IKEv1]: Group = client, Username = bank, IP = 93.91

.193.108, QM FSM error (P2 struct &0xac399d28, mess id 0x8a3d3ca3)!

May 29 03:13:42 [IKEv1]: Group = client, Username = bank, IP = 93.91.193.108, Re

moving peer from correlator table failed, no match! Active-ASA# May 29 03:13:42 [IKEv1]: Group = client, Username = bank, IP = 93.91
.193.108, QM FSM error (P2 struct &0xac399d28, mess id 0x8a3d3ca3)!
May 29 03:13:42 [IKEv1]: Group = client, Username = bank, IP = 93.91.193.108, Re
moving peer from correlator table failed, no match!

can you please share the complete debug outputs from the beginning as you connect to it. Thanks.

Active-ASA# May 29 03:26:06 [IKEv1]: Group = client, Username = bank, IP = 93.91

.193.108, QM FSM error (P2 struct &0xac399670, mess id 0x5964d318)!

May 29 03:26:06 [IKEv1]: Group = client, Username = bank, IP = 93.91.193.108, Re

moving peer from correlator table failed, no match!

doesn't look like the complete output. can you please run the following debugs:

debug cry isa

debug cry ipsec

also logs from vpn client pls.

Thank you very much the issue has been solved.

Great to hear, what was the last issue btw?

Thanks for your update.

I reseted the transform set only then it work.

Thanks