159 11:59:42.015 12/23/09 Sev=Info/4 IKE/0x63000014 RECEIVING <<< ISAKMP OAK INFO *(HASH, DEL) from X.X.X.X
160 11:59:42.015 12/23/09 Sev=Info/5 IKE/0x6300003C Received a DELETE payload for IKE SA with Cookies: I_Cookie=3EC217BD892FAA R_Cookie=1918DD5EF326D0C2
161 11:59:42.015 12/23/09 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to X.X.X.X.X
162 11:59:42.015 12/23/09 Sev=Info/4 IKE/0x63000049 Discarding IPsec SA negotiation, MsgID=27002AF7
163 11:59:42.015 12/23/09 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=3EC217BDCC892FAA R_Cookie=1918DD5EF326D0C2) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
164 11:59:42.484 12/23/09 Sev=Info/4 IPSEC/0x63700014 Deleted all keys
165 11:59:42.984 12/23/09 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=3EC217BDCC892FAA R_Cookie=1918DD5EF326D0C2) reason = PEER_DELETE-IKE_DELETE_UNSPECIFIED
166 11:59:42.984 12/23/09 Sev=Info/4 CM/0x63100012 Phase 1 SA deleted before first Phase 2 SA is up cause by "PEER_DELETE-IKE_DELETE_UNSPECIFIED". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
Dec 23 07:25:08 [IKEv1]: Group = UL, Username = stlili, IP = x.x.x.x., Tunnel Rejected: Conflicting protocols specified by tunnel-group and group-policy Dec 23 07:25:08 [IKEv1]: Group = UL, Username = stlili, IP = x.x.x.x., QM FSM error (P2 struct &0xd5e89a58, mess id 0x3419efed)! Dec 23 07:25:08 [IKEv1]: Group = UL, Username = stlili, IP =x.x.x.x., Removing peer from correlator table failed, no match!
I have checked my group policy and everything is fine i`m actually using the ASDM
Go to ipsec rules and change uncheck the " ASA SIDE HOSTNETWORK FROM ADDRESS TRANSLATION"
These step can be done through ASDM, go the the VPN then to IP-SEC rules n double click the IP and uncheck the above said option. As by default address translation is enable n it stop the tunnel to come up.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
[toc:faq]Introduction:This document describes details on how NAT-T
works.Background:ESP encrypts all critical information, encapsulating
the entire inner TCP/UDP datagram within an ESP header. ESP is an IP
protocol in the same sense that TCP and UDP are I...