I have setup remote access via ASDM and it seems like I am missing some NAT rules and or something because I cannot connect for the life of me. I am using Cisco VPN client Version 5.0.01 0600 and I am recieving error message Reason 412:The remote peer is no longer responding. I am testing the connection internally from the site, is this causing a loop and preventing me from connecting? Do I need to test it remotely?
First observation I do not see clear is the incomplete nonat exempt rule access-list inside_nat0_outbound extended permit ip any 192.168.1.128 255 and comparing it against your VPN Pool address VPN_Pool 192.168.1.150-192.168.1.160 mask 255.255.255.0 , also your VLAN1 which is your inside interface LAN that also routes for 192.168.1.0/24 network is also used for VPN Pool which by the way is ok, but also opens doors for problems and sometimes could be painfull to troubleshoot.
Personally if there is not a real good reason to use VPN network ID and inside Network ID I recomend to keep networks separated usinng their own network ID . If your inside LAN is 192.168.1.0/24 , make your VPN pool something different , 172.16.1.0/24 is one example.
Going back to your possible problems I would re-design your logical network for VPN pool, should be fairly easy to do:
remove a recreate Pool
no ip local pool VPN_Pool 192.168.1.150-192.168.1.160 mask 255.255.255.0
create new one
ip local pool VPN_Pool 172.16.1.150-172.16.1.160 mask 255.255.255.0
remove this acl --> access-list inside_nat0_outbound extended permit ip any 192.168.1.128 255......
add new exempt acl bellow
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0
one statement you also need is to enable NAT traversal
asa(config)#crypto isakmp nat-traversal 20
that's it prety much, you should test RA VPN from the outside internet.
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...