Cisco VPN client keeps disconnecting even the tunnel is in use
I meet a problem that the vpn client keeps disconnectiong and need to reauthenticate. Sometimes it disconnected after the vpn client is connect to ASA for 5 minutes, sometimes it's 20 minutes. But the worst thing is, even the client is using the tunnel, it disconnected.. With continus ping, it disconnected.
In the group policy, the vpn-idle-timeout is set to 45. And isakmp keepalive threhold is 300s. Does anybody aware of this problem?
sh run group-p: group-policy TerminalServices internal group-policy TerminalServices attributes dns-server value vpn-idle-timeout 30 split-tunnel-policy tunnelspecified split-tunnel-network-list value SplitTunnelACL default-domain value secure-unit-authentication enable user-authentication enable group-policy TS_group internal group-policy TS_group attributes banner value dns-server value vpn-idle-timeout 45 vpn-filter value TS_vpn_users vpn-tunnel-protocol IPSec split-tunnel-policy tunnelall default-domain value
The cilents are using the TS_group. Could you tell me how to debug the vpn client seesions? It appears debug crypto isakmp and debug crypto crypto ipsec both not working for this.
PS: I understand that group-policy can be inherited. Normally, only the value from cisco default policy would be inherited to customized policies?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :