<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Easy VPN access - Connection failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622908#M1035104</link>
    <description>&lt;P&gt;I have configured my ASA to recieve EASY VPN connections from 877 and 871 routers. All routers eventually connect but the ASA is throwing up these messages when  'debug crypto isakmp' is set off:&lt;/P&gt;&lt;P&gt;Nov 28 14:15:15 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;Nov 28 14:15:16 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:15:16 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;Nov 28 14:15:17 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:17:05 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 58.105.25.1, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:17:39 [IKEv1]: Group = DefaultRAGroup, IP = 58.105.25.1, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:17:39 [IKEv1]: Group = DefaultRAGroup, IP = 58.105.25.1, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication for the easy vpn is via a radius server and the username and password is held on there for the end routers connecting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is leading to the connection attempts continuing for hours and it is happening every 1 second for some of these routers. Not exactly pushing the Radius server hard but something it could do without.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts anyone?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:02:09 GMT</pubDate>
    <dc:creator>r-frank</dc:creator>
    <dc:date>2019-03-11T09:02:09Z</dc:date>
    <item>
      <title>Easy VPN access - Connection failure</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622908#M1035104</link>
      <description>&lt;P&gt;I have configured my ASA to recieve EASY VPN connections from 877 and 871 routers. All routers eventually connect but the ASA is throwing up these messages when  'debug crypto isakmp' is set off:&lt;/P&gt;&lt;P&gt;Nov 28 14:15:15 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;Nov 28 14:15:16 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:15:16 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;Nov 28 14:15:17 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 60.x.x.230, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:17:05 [IKEv1]: Group = DefaultRAGroup, Username = remuser1, IP = 58.105.25.1, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:17:39 [IKEv1]: Group = DefaultRAGroup, IP = 58.105.25.1, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;Nov 28 14:17:39 [IKEv1]: Group = DefaultRAGroup, IP = 58.105.25.1, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication for the easy vpn is via a radius server and the username and password is held on there for the end routers connecting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is leading to the connection attempts continuing for hours and it is happening every 1 second for some of these routers. Not exactly pushing the Radius server hard but something it could do without.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts anyone?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:02:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622908#M1035104</guid>
      <dc:creator>r-frank</dc:creator>
      <dc:date>2019-03-11T09:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN access - Connection failure</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622909#M1035105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you cenable the following on the ASA&lt;/P&gt;&lt;P&gt;"deb cry isa 128"  "deb cry ipsec 128"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And on the router side:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"deb cry isa"&lt;/P&gt;&lt;P&gt;"deb cry ipsec"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Collect those and let me take a look at why this is happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Gilbert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 20:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622909#M1035105</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2006-11-29T20:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN access - Connection failure</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622910#M1035106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gilbert,&lt;/P&gt;&lt;P&gt;The above info is from the ASA debug crypto isakmp...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 21:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622910#M1035106</guid>
      <dc:creator>r-frank</dc:creator>
      <dc:date>2006-11-29T21:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN access - Connection failure</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622911#M1035107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;More debug from the ASA using&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug crypto isakmp 128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Nov 2006 07:06:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622911#M1035107</guid>
      <dc:creator>r-frank</dc:creator>
      <dc:date>2006-11-30T07:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: Easy VPN access - Connection failure</title>
      <link>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622912#M1035108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for sending the debugs from the ASA.  I understand that you have the routers configured for EzVPN connection to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that be the case, do you have a specific group configured for the EzVPN clients on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do, then the connections for the EzVPN should be landing on the group configured for EzVPN connections and not on the DefaultRAGroup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like there is something wrong on the ASA configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check the ASA configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Gilbert &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Nov 2006 14:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-vpn-access-connection-failure/m-p/622912#M1035108</guid>
      <dc:creator>ggilbert</dc:creator>
      <dc:date>2006-11-30T14:54:43Z</dc:date>
    </item>
  </channel>
</rss>

