<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - RAVPN IPSEC not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142605#M1073418</link>
    <description>&lt;P&gt;Hello Rob,&lt;BR /&gt;&lt;BR /&gt;I installed and old Legacy client 5.0.7.04 on windows 10 PC with help of some registry editing and then I added the Group-policy creds and IP in the client but it is failing while negotiating security policies, I tried the same config on another firewall with same OS version and it worked with that firewall.&lt;BR /&gt;I want to find out why the firewall is failing it.&lt;/P&gt;&lt;P&gt;I attached the config. Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Aug 2020 18:38:43 GMT</pubDate>
    <dc:creator>LovejitSingh1313</dc:creator>
    <dc:date>2020-08-27T18:38:43Z</dc:date>
    <item>
      <title>Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142586#M1073414</link>
      <description>&lt;P&gt;Hello Guys,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326193"&gt;@Scott Fella&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/244950"&gt;@Vikas Saxena&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/315262"&gt;@nkarthikeyan&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I configured the RAVPN ikev1 IPsec using an old client on the firewall but it's not working. I tried the same configuration and it works fine.&lt;BR /&gt;&lt;BR /&gt;I get the following error message.&lt;BR /&gt;Secure VPN Connection terminated by Peer.&lt;BR /&gt;Reason 433. (Reason not specified by peer)&lt;BR /&gt;&lt;BR /&gt;It happens when it accepts user password and start negotiating security policies.&lt;BR /&gt;&lt;BR /&gt;It looks like some policy is interfering with it but I do not know which commands I should run to find out the conflicting policy/ACLs.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142586#M1073414</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T18:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142588#M1073415</link>
      <description>&lt;P&gt;here is the common problem and solution :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="vpnconn" target="_blank"&gt;&lt;/A&gt;VPN Client Drops Connection Frequently on First Attempt or "Security VPN Connection terminated by peer. Reason 433." or "Secure VPN Connection terminated by Peer Reason 433:(Reason Not Specified by Peer)"&lt;/H2&gt;
&lt;H3&gt;&lt;A name="vpnconn-problem" target="_blank"&gt;&lt;/A&gt;Problem&lt;/H3&gt;
&lt;P&gt;Cisco VPN client users might receive this error when they attempt the connection with the head end VPN device.&lt;/P&gt;
&lt;P&gt;"&lt;I&gt;VPN client drops connection frequently on first attempt&lt;/I&gt;" or "&lt;I&gt;Security VPN Connection terminated by peer. Reason 433.&lt;/I&gt;" or "&lt;I&gt;Secure VPN Connection terminated by Peer Reason 433:(Reason Not Specified by Peer)&lt;/I&gt;" or "&lt;I&gt;Attempted to assign network or broadcast IP address, removing (x.x.x.x) from pool&lt;/I&gt;"&lt;/P&gt;
&lt;H3&gt;&lt;A name="vpnconn-solution" target="_blank"&gt;&lt;/A&gt;Solution 1&lt;/H3&gt;
&lt;P&gt;The problem might be with the IP pool assignment either through ASA/PIX, Radius server, DHCP server or through Radius server acting as DHCP server. Use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;debug crypto&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command in order to verify that the netmask and IP addresses are correct. Also, verify that the pool does not include the network address and the broadcast address. Radius servers must be able to assign the proper IP addresses to the clients.&lt;/P&gt;
&lt;H3&gt;&lt;A name="err433-solution" target="_blank"&gt;&lt;/A&gt;Solution 2&lt;/H3&gt;
&lt;P&gt;This issue also occurs due to the failure of extended authentication. You must check the AAA server to troubleshoot this error. Checking the server authentication password on Server and client and reloading the AAA server might resolve this issue.&lt;/P&gt;
&lt;H3&gt;&lt;A name="threatdet" target="_blank"&gt;&lt;/A&gt;Solution 3&lt;/H3&gt;
&lt;P&gt;Another workaround for this issue is to disable the threat detection feature. At times when there are multiple re-transmissions for different incomplete Security Associations (SAs), the ASA with the threat-detection feature enabled thinks that a scanning attack is occuring and the VPN ports are marked as the main offender. Try to disable the threat-detection feature as this can cause a lot of overhead on the processing of ASA. Use these commands in order to disable the threat detection:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;PRE&gt;no threat-detection basic-threat
no threat-detection scanning-threat shun
no threat-detection statistics
no threat-detection rate&lt;/PRE&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;For more information about this feature, refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/t.html#wp1508750" target="_blank"&gt;Threat Detection&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&amp;nbsp;&lt;/STRONG&gt;This can be used as a workaround to verify if this fixes the actual problem. Make sure that disabling the threat detection on the Cisco ASA actually compromises several security features such as mitigating the Scanning Attempts, DoS with Invalid SPI, packets that fail Application Inspection and Incomplete Sessions.&lt;/P&gt;
&lt;H3&gt;&lt;A name="transsol" target="_blank"&gt;&lt;/A&gt;Solution 4&lt;/H3&gt;
&lt;P&gt;This issue also occurs when a transform set is not properly configured. A proper configuration of the transform set resolves the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:16:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142588#M1073415</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-08-27T18:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142591#M1073416</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I already followed this article and tried all the options, I did not see the debugs when my VPN client try to connect it. I need help with commands where I can find the ACL or policy which is not allowing the VPN session ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142591#M1073416</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T18:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142595#M1073417</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am not clear on your comment - "I configured the RAVPN ikev1 IPsec using an old client on the firewall but it's not working. I tried the same configuration and it works fine."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it working randomly or did you try the configuration on another device (ASA or computer) and then it worked?&lt;/P&gt;
&lt;P&gt;Are you using the old VPN client? some ciphers are depreciated so may no longer be supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Provide your configuration and ASA version.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142595#M1073417</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T18:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142605#M1073418</link>
      <description>&lt;P&gt;Hello Rob,&lt;BR /&gt;&lt;BR /&gt;I installed and old Legacy client 5.0.7.04 on windows 10 PC with help of some registry editing and then I added the Group-policy creds and IP in the client but it is failing while negotiating security policies, I tried the same config on another firewall with same OS version and it worked with that firewall.&lt;BR /&gt;I want to find out why the firewall is failing it.&lt;/P&gt;&lt;P&gt;I attached the config. Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142605#M1073418</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T18:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142613#M1073419</link>
      <description>&lt;P&gt;From which ASA is that configuration from, the working or non working ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the working ASA, login as a user and then run "show vpn-sessiondb detail anyconnect" and provide the output for review. Also provide the configuration of the other ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The old VPN client does not support the latest ciphers, is there a configuration difference between the 2 ASAs in regard to ikev1 or ssl configuration? The working ASA might be configured to use certain ciphers compared to the other ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any reason why you cannot use AnyConnect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you using IKEv1 or SSL when connecting?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142613#M1073419</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T18:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142626#M1073420</link>
      <description>&lt;P&gt;The configuration I attached is for not working ASA.&amp;nbsp; I setup on outside2 interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using Ikev1 RAVPN over Ipsec, not having license for AnyConnect?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other firewall where its working, I configured in a same way through the ASDM and I did not encounter any menu where i can choose/see ciphers.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142626#M1073420</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T18:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142631#M1073422</link>
      <description>&lt;P&gt;Ok. Provide the configuration of the other ASA so we can compare ike/ipsec policies and provide the output of "show vpn-sessiondb detail" of a logged in user so we can determine what ciphers have been negotiated.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 19:11:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142631#M1073422</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T19:11:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142634#M1073423</link>
      <description>&lt;P&gt;From the Working Firewall and I am connected with RAVPN client.&lt;/P&gt;&lt;P&gt;ciscoasa# sh vpn-sessiondb detail anyconnect&lt;BR /&gt;INFO: There are presently no active sessions of the type specified&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Config of working firewall:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: 9AW36TBSXS1&lt;BR /&gt;: Hardware: ASAv, 2048 MB RAM, CPU Pentium II 2800 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.12(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;ip local pool RAVPN-pool 192.168.20.1-192.168.20.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.2.122 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 11.11.11.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif GuestWIFI&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 21.21.21.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network vlan10&lt;BR /&gt;subnet 11.11.11.0 255.255.255.0&lt;BR /&gt;object network vlan20&lt;BR /&gt;subnet 21.21.21.0 255.255.255.0&lt;BR /&gt;object network Office_1&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;object network Office_2&lt;BR /&gt;subnet 11.11.11.0 255.255.255.0&lt;BR /&gt;object network Site-A-VPN&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.20.0_27&lt;BR /&gt;subnet 192.168.20.0 255.255.255.224&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object 11.11.11.0 255.255.255.0&lt;BR /&gt;network-object object Office_1&lt;BR /&gt;access-list VLAN10 extended permit ip 11.11.11.0 255.255.255.0 any&lt;BR /&gt;access-list VLAN20 extended permit ip 21.21.21.0 255.255.255.0 any&lt;BR /&gt;access-list VPN-Traffic extended permit ip object Office_2 object Office_1&lt;BR /&gt;access-list VPN-SSL-IPSEC extended permit ip object Office_2 object Site-A-VPN&lt;BR /&gt;access-list VPN-SSL-IPSEC extended permit ip object Office_2 object Office_1&lt;BR /&gt;access-list Remote-VPN_splitTunnelAcl standard permit 11.11.11.0 255.255.255.0&lt;BR /&gt;access-list Remote-VPN_splitTunnelAcl standard permit 10.10.10.0 255.255.255.0&lt;BR /&gt;pager lines 23&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu GuestWIFI 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface inside&lt;BR /&gt;no monitor-interface GuestWIFI&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any GuestWIFI&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;nat (inside,outside) source static Office_2 Office_2 destination static Office_1 Office_1 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Office_2 Office_2 destination static Site-A-VPN Site-A-VPN no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static NETWORK_OBJ_192.168.20.0_27 NETWORK_OBJ_192.168.20.0_27 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network vlan10&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network vlan20&lt;BR /&gt;nat (GuestWIFI,outside) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal VPN-Transform&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map CRYPTO_MAP 1 match address VPN-SSL-IPSEC&lt;BR /&gt;crypto map CRYPTO_MAP 1 set peer 192.168.2.121&lt;BR /&gt;crypto map CRYPTO_MAP 1 set ikev2 ipsec-proposal VPN-Transform&lt;BR /&gt;crypto map CRYPTO_MAP 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map CRYPTO_MAP interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 0509&lt;BR /&gt;308205b7 3082039f a0030201 02020205 09300d06 092a8648 86f70d01 01050500&lt;BR /&gt;3045310b 30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164&lt;BR /&gt;6973204c 696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f&lt;BR /&gt;6f742043 41203230 1e170d30 36313132 34313832 3730305a 170d3331 31313234&lt;BR /&gt;31383233 33335a30 45310b30 09060355 04061302 424d3119 30170603 55040a13&lt;BR /&gt;1051756f 56616469 73204c69 6d697465 64311b30 19060355 04031312 51756f56&lt;BR /&gt;61646973 20526f6f 74204341 20323082 0222300d 06092a86 4886f70d 01010105&lt;BR /&gt;00038202 0f003082 020a0282 0201009a 18ca4b94 0d002daf 03298af0 0f81c8ae&lt;BR /&gt;4c19851d 089fab29 4485f32f 81ad321e 9046bfa3 86261a1e fe7e1c18 3a5c9c60&lt;BR /&gt;172a3a74 8333307d 615411cb edabe0e6 d2a27ef5 6b6f18b7 0a0b2dfd e93eef0a&lt;BR /&gt;c6b310e9 dcc24617 f85dfda4 daff9e49 5a9ce633 e62496f7 3fba5b2b 1c7a35c2&lt;BR /&gt;d667feab 66508b6d 28602bef d760c3c7 93bc8d36 91f37ff8 db1113c4 9c7776c1&lt;BR /&gt;aeb7026a 817aa945 83e205e6 b956c194 378f4871 6322ec17 6507958a 4bdf8fc6&lt;BR /&gt;5a0ae5b0 e35f5e6b 11ab0cf9 85eb44e9 f80473f2 e9fe5c98 8cf573af 6bb47ecd&lt;BR /&gt;d45c022b 4c39e1b2 95952d42 87d7d5b3 9043b76c 13f1dedd f6c4f889 3fd175f5&lt;BR /&gt;92c391d5 8a88d090 ecdc6dde 89c26571 968b0d03 fd9cbf5b 16ac92db eafe797c&lt;BR /&gt;adebaff7 16cbdbcd 252be51f fb9a9fe2 51cc3a53 0c48e60e bdc9b476 0652e611&lt;BR /&gt;13857263 0304e004 362b2019 02e874a7 1fb6c956 66f07525 dc67c10e 616088b3&lt;BR /&gt;3ed1a8fc a3da1db0 d1b12354 df44766d ed41d8c1 b222b653 1cdf351d dca1772a&lt;BR /&gt;31e42df5 e5e5dbc8 e0ffe580 d70b63a0 ff33a10f ba2c1515 ea97b3d2 a2b5bef2&lt;BR /&gt;8c961e1a 8f1d6ca4 6137b986 7333d797 969e237d 82a44c81 e2a1d1ba 675f9507&lt;BR /&gt;a32711ee 16107bbc 454a4cb2 04d2abef d5fd0c51 ce506a08 31f991da 0c8f645c&lt;BR /&gt;03c33a8b 203f6e8d 673d3ad6 fe7d5b88 c95efbcc 61dc8b33 77d34432 35096204&lt;BR /&gt;921610d8 9e2747fb 3b21e3f8 eb1d5b02 03010001 a381b030 81ad300f 0603551d&lt;BR /&gt;130101ff 04053003 0101ff30 0b060355 1d0f0404 03020106 301d0603 551d0e04&lt;BR /&gt;1604141a 8462bc48 4c332504 d4eed0f6 03c41946 d1946b30 6e060355 1d230467&lt;BR /&gt;30658014 1a8462bc 484c3325 04d4eed0 f603c419 46d1946b a149a447 3045310b&lt;BR /&gt;30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164 6973204c&lt;BR /&gt;696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f 6f742043&lt;BR /&gt;41203282 02050930 0d06092a 864886f7 0d010105 05000382 0201003e 0a164d9f&lt;BR /&gt;065ba8ae 715d2f05 2f67e613 4583c436 f6f3c026 0c0db547 645df8b4 72c946a5&lt;BR /&gt;03182755 89787d76 ea963480 1720dce7 83f88dfc 07b8da5f 4d2e67b2 84fdd944&lt;BR /&gt;fc775081 e67cb4c9 0d0b7253 f8760707 4147960c fbe08226 93558cfe 221f6065&lt;BR /&gt;7c5fe726 b3f73290 9850d437 7155f692 2178f795 79faf82d 26876656 3077a637&lt;BR /&gt;78335210 58ae3f61 8ef26ab1 ef187e4a 5963ca8d a256d5a7 2fbc561f cf39c1e2&lt;BR /&gt;fb0aa815 2c7d4d7a 63c66c97 443cd26f c34a170a f890d257 a21951a5 2d9741da&lt;BR /&gt;074fa950 da908d94 46e13ef0 94fd1000 38f53be8 40e1b46e 561a20cc 6f588ded&lt;BR /&gt;2e458fd6 e9933fe7 b12cdf3a d6228cdc 84bb226f d0f8e4c6 39e90488 3cc3baeb&lt;BR /&gt;557a6d80 9924f56c 01fbf897 b0945beb fdd26ff1 77680d35 6423acb8 55a103d1&lt;BR /&gt;4d4219dc f8755956 a3f9a849 79f8af0e b911a07c b76aed34 d0b62662 381a870c&lt;BR /&gt;f8e8fd2e d3907f07 912a1dd6 7e5c8583 99b03808 3fe95ef9 3507e4c9 626e577f&lt;BR /&gt;a75095f7 bac89be6 8ea201c5 d666bf79 61f33c1c e1b9825c 5da0c3e9 d848bd19&lt;BR /&gt;a2111419 6eb2861b 683e4837 1a88b75d 965e9cc7 ef276208 e291195c d2f121dd&lt;BR /&gt;ba174282 97718153 31a99ff6 7d62bf72 e1a3931d cc8a265a 0938d0ce d70d8016&lt;BR /&gt;b478a53a 874c8d8a a5d54697 f22c10b9 bc5422c0 01506943 9ef4b2ef 6df8ecda&lt;BR /&gt;f1e3b1ef df918f54 2a0b25c1 2619c452 100565d5 8210eac2 31cd2e&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 2&lt;BR /&gt;prf md5&lt;BR /&gt;lifetime seconds 21234567&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 1 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd lease 36000&lt;BR /&gt;dhcpd domain Lovejit.com&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 11.11.11.100-11.11.11.200 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 1.1.1.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 21.21.21.100-21.21.21.200 GuestWIFI&lt;BR /&gt;dhcpd dns 8.8.8.8 1.1.1.1 interface GuestWIFI&lt;BR /&gt;dhcpd enable GuestWIFI&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy Remote-VPN internal&lt;BR /&gt;group-policy Remote-VPN attributes&lt;BR /&gt;dns-server value 8.8.8.8 1.1.1.1&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Remote-VPN_splitTunnelAcl&lt;BR /&gt;default-domain value lj.local&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username test password ***** pbkdf2 privilege 0&lt;BR /&gt;username test attributes&lt;BR /&gt;vpn-group-policy Remote-VPN&lt;BR /&gt;username lsingh password ***** pbkdf2&lt;BR /&gt;tunnel-group 192.168.2.121 type ipsec-l2l&lt;BR /&gt;tunnel-group 192.168.2.121 ipsec-attributes&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group Remote-VPN type remote-access&lt;BR /&gt;tunnel-group Remote-VPN general-attributes&lt;BR /&gt;address-pool RAVPN-pool&lt;BR /&gt;default-group-policy Remote-VPN&lt;BR /&gt;tunnel-group Remote-VPN ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns migrated_dns_map_1&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:950605f75ab3251a10f97c47ff222761&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 19:24:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142634#M1073423</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T19:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142635#M1073424</link>
      <description>&lt;P&gt;"show vpn-sessiondb detail"&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 19:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142635#M1073424</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T19:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142636#M1073425</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Output of #sh crypto sa from working firewall&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;local crypto endpt.: 192.168.2.122/0, remote crypto endpt.: 192.168.2.114/0&lt;BR /&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: 7AD39DE2&lt;BR /&gt;current inbound spi : AFEE53CD&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0xAFEE53CD (2951631821)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes esp-sha-hmac no compression&lt;BR /&gt;in use settings ={RA, Tunnel, IKEv1, }&lt;BR /&gt;slot: 0, conn_id: 1, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;sa timing: remaining key lifetime (sec): 28376&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0x7AD39DE2 (2060688866)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes esp-sha-hmac no compression&lt;BR /&gt;in use settings ={RA, Tunnel, IKEv1, }&lt;BR /&gt;slot: 0, conn_id: 1, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;sa timing: remaining key lifetime (sec): 28376&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 19:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142636#M1073425</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T19:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142639#M1073426</link>
      <description>&lt;P&gt;ciscoasa# sh vpn-sessiondb detail&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;VPN Session Summary&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;Active : Cumulative : Peak Concur : Inactive&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;IKEv1 IPsec/L2TP IPsec : 1 : 2 : 1&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;Total Active and Inactive : 1 Total Cumulative : 2&lt;BR /&gt;Device Total VPN Capacity : 250&lt;BR /&gt;Device Load : 0%&lt;BR /&gt;---------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------&lt;BR /&gt;Tunnels Summary&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;Active : Cumulative : Peak Concurrent&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;IKEv1 : 1 : 2 : 1&lt;BR /&gt;IPsec : 1 : 2 : 1&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;Totals : 2 : 4&lt;BR /&gt;---------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 19:32:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142639#M1073426</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T19:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142647#M1073428</link>
      <description>&lt;P&gt;Sorry output of this command please "show vpn-sessiondb detail ra-ikev1-ipsec" from the working ASA and "show crypto ikev1 sa"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the non-working ASA, enabled debug "debug crypto ikev1 128" attempt to connect to the VPN and provide the output.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 19:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142647#M1073428</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T19:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142662#M1073430</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# sh crypto ikev1 sa&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;Active SA: 1&lt;BR /&gt;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;1 IKE Peer: 192.168.2.114&lt;BR /&gt;Type : user Role : responder&lt;BR /&gt;Rekey : no State : AM_ACTIVE&lt;BR /&gt;ciscoasa#&lt;BR /&gt;ciscoasa#&lt;BR /&gt;ciscoasa# show vpn-sessiondb detail ra-ikev1-ipsec&lt;/P&gt;&lt;P&gt;Session Type: IKEv1 IPsec Detailed&lt;/P&gt;&lt;P&gt;Username : lsingh Index : 6&lt;BR /&gt;Assigned IP : 192.168.20.1 Public IP : 192.168.2.114&lt;BR /&gt;Protocol : IKEv1 IPsec&lt;BR /&gt;License : Other VPN&lt;BR /&gt;Encryption : IKEv1: (1)AES256 IPsec: (1)AES128&lt;BR /&gt;Hashing : IKEv1: (1)SHA1 IPsec: (1)SHA1&lt;BR /&gt;Bytes Tx : 0 Bytes Rx : 0&lt;BR /&gt;Pkts Tx : 0 Pkts Rx : 0&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;Group Policy : Remote-VPN Tunnel Group : Remote-VPN&lt;BR /&gt;Login Time : 19:50:09 UTC Thu Aug 27 2020&lt;BR /&gt;Duration : 0h:00m:49s&lt;BR /&gt;Inactivity : 0h:00m:00s&lt;BR /&gt;VLAN Mapping : N/A VLAN : none&lt;BR /&gt;Audt Sess ID : 0b0b0b01000060005f480e71&lt;BR /&gt;Security Grp : none&lt;/P&gt;&lt;P&gt;IKEv1 Tunnels: 1&lt;BR /&gt;IPsec Tunnels: 1&lt;/P&gt;&lt;P&gt;IKEv1:&lt;BR /&gt;Tunnel ID : 6.1&lt;BR /&gt;UDP Src Port : 57492 UDP Dst Port : 500&lt;BR /&gt;IKE Neg Mode : Aggressive Auth Mode : preSharedKeys&lt;BR /&gt;Encryption : AES256 Hashing : SHA1&lt;BR /&gt;Rekey Int (T): 86400 Seconds Rekey Left(T): 86355 Seconds&lt;BR /&gt;D/H Group : 2&lt;BR /&gt;Filter Name :&lt;BR /&gt;Client OS : WinNT Client OS Ver: 5.0.07.0440&lt;/P&gt;&lt;P&gt;IPsec:&lt;BR /&gt;Tunnel ID : 6.2&lt;BR /&gt;Local Addr : 0.0.0.0/0.0.0.0/0/0&lt;BR /&gt;Remote Addr : 192.168.20.1/255.255.255.255/0/0&lt;BR /&gt;Encryption : AES128 Hashing : SHA1&lt;BR /&gt;Encapsulation: Tunnel&lt;BR /&gt;Rekey Int (T): 28800 Seconds Rekey Left(T): 28754 Seconds&lt;BR /&gt;Rekey Int (D): 4608000 K-Bytes Rekey Left(D): 4608000 K-Bytes&lt;BR /&gt;Idle Time Out: 30 Minutes Idle TO Left : 29 Minutes&lt;BR /&gt;Bytes Tx : 0 Bytes Rx : 0&lt;BR /&gt;Pkts Tx : 0 Pkts Rx : 0&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;Debug from non working Firewall&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IKE Receiver: Packet received on 206.47.141.30:4500 from 99.250.11.11:64664&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IP = 99.250.11.11, IKE_DECODE RECEIVED Message (msgid=d611dc77) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 84&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, IP = 99.250.11.11, process_attr(): Enter!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, IP = 99.250.11.11, Processing MODE_CFG Reply attributes.&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: primary DNS = 172.1.100.110&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: secondary DNS = 172.1.100.101&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: primary WINS = cleared&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: secondary WINS = cleared&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: split tunneling list = Test12345_splitTunnelAcl&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: default domain = kohlandfrisch.com&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: IP Compression = disabled&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: Split Tunneling Policy = Split Network&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: Browser Proxy Setting = no-modify&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKEGetUserAttributes: Browser Proxy Bypass Local = disable&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]Group = Test12345, Username = lsingh, IP = 99.250.11.11, User (lsingh) authenticated.&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, constructing blank hash payload&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, constructing qm hash payload&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IP = 99.250.11.11, IKE_DECODE SENDING Message (msgid=8d0a8fe) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 60&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IKE Receiver: Packet received on 206.47.141.30:4500 from 99.250.11.11:64664&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IP = 99.250.11.11, IKE_DECODE RECEIVED Message (msgid=8d0a8fe) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 56&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, process_attr(): Enter!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, Processing cfg ACK attributes&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IKE Receiver: Packet received on 206.47.141.30:4500 from 99.250.11.11:64664&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IP = 99.250.11.11, IKE_DECODE RECEIVED Message (msgid=651dec97) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 172&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, process_attr(): Enter!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, Processing cfg Request attributes&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for IPV4 address!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for IPV4 net mask!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for DNS server address!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for WINS server address!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]Group = Test12345, Username = lsingh, IP = 99.250.11.11, Received unsupported transaction mode attribute: 5&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Banner!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Save PW setting!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Default Domain Name!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Split Tunnel List!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Split DNS!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for PFS setting!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Client Browser Proxy Setting!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for backup ip-sec peer list!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Client Smartcard Removal Disconnect Setting!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for Application Version!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]Group = Test12345, Username = lsingh, IP = 99.250.11.11, Client Type: WinNT Client Application Version: 5.0.07.0440&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for FWTYPE!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, MODE_CFG: Received request for DHCP hostname for DDNS is: LJ_FS1!&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKE received response of type [] to a request from the IP address utility&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]Group = Test12345, Username = lsingh, IP = 99.250.11.11, Cannot obtain an IP address for remote peer&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKE TM V6 FSM error history (struct &amp;amp;0x00007f9f7e928410) &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;: TM_DONE, EV_ERROR--&amp;gt;TM_BLD_REPLY, EV_IP_FAIL--&amp;gt;TM_BLD_REPLY, NullEvent--&amp;gt;TM_BLD_REPLY, EV_GET_IP--&amp;gt;TM_BLD_REPLY, EV_NEED_IP--&amp;gt;TM_WAIT_REQ, EV_PROC_MSG--&amp;gt;TM_WAIT_REQ, EV_HASH_OK--&amp;gt;TM_WAIT_REQ, NullEvent&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKE AM Responder FSM error history (struct &amp;amp;0x00007f9f806237d0) &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;: AM_DONE, EV_ERROR--&amp;gt;AM_TM_INIT_MODECFG_V6H, EV_TM_FAIL--&amp;gt;AM_TM_INIT_MODECFG_V6H, NullEvent--&amp;gt;AM_TM_INIT_MODECFG, EV_WAIT--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_CHECK_QM_MSG--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_TM_XAUTH_OK--&amp;gt;AM_TM_INIT_XAUTH_V6H, NullEvent--&amp;gt;AM_TM_INIT_XAUTH_V6H, EV_ACTIVATE_NEW_SA&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, IKE SA AM:adf8010a terminating: flags 0x0945c001, refcnt 0, tuncnt 0&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, sending delete/delete with reason message&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, constructing blank hash payload&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, constructing IKE delete payload&lt;BR /&gt;Aug 27 15:57:09 [IKEv1 DEBUG]Group = Test12345, Username = lsingh, IP = 99.250.11.11, constructing qm hash payload&lt;BR /&gt;Aug 27 15:57:09 [IKEv1]IP = 99.250.11.11, IKE_DECODE SENDING Message (msgid=c44c7dea) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 76&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 20:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142662#M1073430</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T20:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142667#M1073431</link>
      <description>&lt;P&gt;Aug 27 15:57:09 [IKEv1]Group = Test12345, Username = lsingh, IP = 99.250.11.11, Cannot obtain an IP address for remote peer&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this error jumps out at me, do you have an IP address pool configured correctly?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 20:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142667#M1073431</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T20:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142677#M1073432</link>
      <description>&lt;P&gt;I tried changing pool but still same logs. its not pool.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 20:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142677#M1073432</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T20:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142682#M1073433</link>
      <description>&lt;P&gt;You've not provided the full configuration for the non-working ASA, please provide the current full configuration after you've made the changing the pool.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Run the debugs again, connect to the VPN and provide the output&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the name of the tunnel-group you are connecting to?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 20:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142682#M1073433</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-27T20:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142691#M1073436</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I find that IP assignment was not enabled for Internal and DHCP, I enabled it and it worked after that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks alot man !&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 21:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142691#M1073436</guid>
      <dc:creator>LovejitSingh1313</dc:creator>
      <dc:date>2020-08-27T21:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - RAVPN IPSEC not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142834#M1073441</link>
      <description>&lt;P&gt;Solution 1 - was your issue if you closely look the config -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="toc-hId-132910397"&gt;Solution 1&lt;/H3&gt;
&lt;P&gt;The problem might be with the IP pool assignment either through ASA/PIX, Radius server, DHCP server or through Radius server acting as DHCP server. Use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;debug crypto&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command in order to verify that the netmask and IP addresses are correct. Also, verify that the pool does not include the network address and the broadcast address. Radius servers must be able to assign the proper IP addresses to the clients.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 07:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ravpn-ipsec-not-working/m-p/4142834#M1073441</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-08-28T07:56:55Z</dc:date>
    </item>
  </channel>
</rss>

