<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote Access IKEv1 VPN DMZ ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073991#M396644</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make the configuration more clear and readable can we take out the Inside interface from the VPN perspective:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;no crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;no crypto ikev1 enable inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not see anything wrong on the configuration, pretty interesting but on the debugs we are going to the default-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 &lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt;with unknown tunnel group name 'user'.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That unknown tunnel group I do not like it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you paste an screenshot about where are you trying to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should set on your VPN client&lt;/P&gt;&lt;P&gt;NetworkRA &lt;/P&gt;&lt;P&gt;Preshared-key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Oct 2012 23:14:27 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-10-29T23:14:27Z</dc:date>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073982#M396620</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a test ASA behind an edge firewall (Checkpoint), and I'm trying to set up the ASA for remote VPN access only. The ports being forwarded are UDP/500, UDP/4500 and UDP/TCP/10000. I'd prefer to encapsulate the sessions into TCP/10000. There's two networks that the ASA is connected to. The DMZ (10.11.12.0/24) and an internal segment (10.10.1.0/24), where the external remote client will connect to the DMZ interface and the goal is to access the internal subnet. The pool I want to set up is 10.11.12.150-200. I have upgraded the ASA to the most current IOS [8.4(4)1] / ASDM [6.4(9)] images. Here's what I've come up with, but unfortuantely the client fails to connect. I have messed around several times with settings using the ASDM, but ultimately I cannot get the client to connect. Here's my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[code]&lt;/P&gt;&lt;P&gt;hostname RemoteVPNASA&lt;/P&gt;&lt;P&gt;domain-name Domain.local&lt;/P&gt;&lt;P&gt;enable password ---------------- encrypted&lt;/P&gt;&lt;P&gt;passwd ---------------- encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.76 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.11.12.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd &lt;/P&gt;&lt;P&gt;banner motd +----------------------------------------------------+&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; *** Unauthorized Use or Access Prohibited ***&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; For Authorized Official Use Only&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; You must have explicit permission to access or&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; configure this device. All activities performed&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; on this device may be logged, and violations of&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd | this policy may result in disciplinary action, and |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; may be reported to law enforcement authorities.&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; There is no right to privacy on this device.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd +----------------------------------------------------+&lt;/P&gt;&lt;P&gt;banner motd &lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name Domain.local&lt;/P&gt;&lt;P&gt;object network Network-10.11.12.0&lt;/P&gt;&lt;P&gt; subnet 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group icmp-type DefaultICMP&lt;/P&gt;&lt;P&gt; description Default ICMP Types permitted&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel remark ACL for VPN Split Tunnel&lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 10.10.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat remark ACL for Nat Bypass&lt;/P&gt;&lt;P&gt;access-list nonat extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_2 &lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended permit icmp any any object-group DefaultICMP &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip local pool IPPool 10.11.12.150-10.11.12.200&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static any any destination static Network-10.11.12.0 Network-10.11.12.0&lt;/P&gt;&lt;P&gt;access-group acl_DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;route DMZ 0.0.0.0 0.0.0.0 10.11.12.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.10.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set FirstSet esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map DynamicMap 1 set ikev1 transform-set FirstSet&lt;/P&gt;&lt;P&gt;crypto dynamic-map DynamicMap 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map NetMap 1 ipsec-isakmp dynamic DynamicMap&lt;/P&gt;&lt;P&gt;crypto map NetMap interface DMZ&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto ikev1 enable inside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable DMZ&lt;/P&gt;&lt;P&gt;crypto ikev1 ipsec-over-tcp port 10000 &lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 43200&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 11&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy Network internal&lt;/P&gt;&lt;P&gt;group-policy Network attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 120&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value vpn_SplitTunnel&lt;/P&gt;&lt;P&gt;username user password ---------------- encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA general-attributes&lt;/P&gt;&lt;P&gt; address-pool IPPool&lt;/P&gt;&lt;P&gt; default-group-policy Network&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:d6e568acfb0bed9dc9979dc1a980f24f&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[/code]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073982#M396620</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2019-03-12T00:15:10Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073983#M396626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you run some debugs and let us have the outputs, what does the ASA logs say when you attemtp to connect?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also can you change the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no crypto map NetMap 1 ipsec-isakmp dynamic DynamicMap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map NetMap 1&amp;nbsp; ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the result,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2012 06:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073983#M396626</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-28T06:23:39Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073984#M396629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for that Julio!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made the change of that command and here's the logging/debug for a connection attempt:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syslog logging: enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facility: 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timestamp logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug-trace logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Console logging: level debugging, 1566 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Monitor logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Buffer logging: level debugging, 1568 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trap logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit-hostdown logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; History logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device ID: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM logging: level informational, 1663 messages logged&lt;/P&gt;&lt;P&gt;%ASA-5-111008: User 'enable_15' executed the 'clear logging buffer' command.&lt;/P&gt;&lt;P&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.10.1.23, executed 'clear logging buffer'&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show logging&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host DMZ:74.125.227.20&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host identity:10.11.12.2&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 371 for DMZ:74.125.227.20/46673 (74.125.227.20/46673) to identity:10.11.12.2/10000 (10.11.12.2/10000)&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 372 for DMZ:74.125.227.20/46673 (74.125.227.20/46673) to identity:10.11.12.2/500 (10.11.12.2/500)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 829&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 74.125.227.20, Responder: IPSec over TCP encapsulation is used&amp;nbsp;&amp;nbsp;&amp;nbsp; local TCP port: 10000&amp;nbsp;&amp;nbsp;&amp;nbsp; peer TCP port:&amp;nbsp; 46673&amp;nbsp; &lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ISA_KE payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received xauth V6 VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received DPD VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Fragmentation VID&lt;/P&gt;&lt;P&gt;%ASA-7-715064: IP = 74.125.227.20, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 with unknown tunnel group name 'user'.&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715028: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ISAKMP SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, Generating keys for Responder...&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = DefaultRAGroup, IP = 74.125.227.20, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Cisco Unity VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing xauth V6 VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing dpd vid payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Fragmentation VID + extended capabilities payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715048: Group = DefaultRAGroup, IP = 74.125.227.20, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 372&lt;/P&gt;&lt;P&gt;%ASA-7-715065: Group = DefaultRAGroup, IP = 74.125.227.20, IKE AM Responder FSM error history (struct &amp;amp;0xcc051860)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_SND_MSG2, EV_SND_MSG--&amp;gt;AM_SND_MSG2, EV_START_TMR--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_TRL--&amp;gt;AM_BLD_MSG2, EV_SKEYID_OK--&amp;gt;AM_BLD_MSG2, NullEvent--&amp;gt;AM_BLD_MSG2, EV_GEN_SKEYID--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_HDR&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA AM:8642b183 terminating:&amp;nbsp; flags 0x0104c001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 371 for DMZ:74.125.227.20/46673 to identity:10.11.12.2/10000 duration 0:00:00 bytes 396 Flow closed by inspection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know when you can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 12:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073984#M396629</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-10-29T12:36:08Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073985#M396632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is our problem:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 371 for DMZ:74.125.227.20/46673 to identity:10.11.12.2/10000 duration 0:00:00 bytes 396 Flow closed by inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add the following commands and try it one more time&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Sysopt connection preserve-vpn-flows &lt;/P&gt;&lt;P&gt; Sysopt connection reclassify-vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I have the show run nat and show run policy-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 16:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073985#M396632</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-29T16:34:59Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073986#M396636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here ya go (it still does not connect):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RemoteVPNASA# sh run nat&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static any any destination static Network-10.11.12.0 Network-10.11.12.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RemoteVPNASA# sh run policy-map &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syslog logging: enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facility: 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timestamp logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug-trace logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Console logging: level debugging, 2534 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Monitor logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Buffer logging: level debugging, 2536 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trap logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit-hostdown logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; History logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device ID: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM logging: level informational, 2066 messages logged&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show logging&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 380 for DMZ:74.125.227.20/20486 (74.125.227.20/20486) to identity:10.11.12.2/10000 (10.11.12.2/10000)&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 381 for DMZ:74.125.227.20/20486 (74.125.227.20/20486) to identity:10.11.12.2/500 (10.11.12.2/500)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 829&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 74.125.227.20, Responder: IPSec over TCP encapsulation is used&amp;nbsp;&amp;nbsp;&amp;nbsp; local TCP port: 10000&amp;nbsp;&amp;nbsp;&amp;nbsp; peer TCP port:&amp;nbsp; 20486&amp;nbsp; &lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ISA_KE payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received xauth V6 VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received DPD VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Fragmentation VID&lt;/P&gt;&lt;P&gt;%ASA-7-715064: IP = 74.125.227.20, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 with unknown tunnel group name 'user'.&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715028: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ISAKMP SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, Generating keys for Responder...&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = DefaultRAGroup, IP = 74.125.227.20, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Cisco Unity VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing xauth V6 VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing dpd vid payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Fragmentation VID + extended capabilities payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715048: Group = DefaultRAGroup, IP = 74.125.227.20, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 372&lt;/P&gt;&lt;P&gt;%ASA-7-715065: Group = DefaultRAGroup, IP = 74.125.227.20, IKE AM Responder FSM error history (struct &amp;amp;0xcbf25fe0)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_SND_MSG2, EV_SND_MSG--&amp;gt;AM_SND_MSG2, EV_START_TMR--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_TRL--&amp;gt;AM_BLD_MSG2, EV_SKEYID_OK--&amp;gt;AM_BLD_MSG2, NullEvent--&amp;gt;AM_BLD_MSG2, EV_GEN_SKEYID--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_HDR&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA AM:7d9c0b7a terminating:&amp;nbsp; flags 0x0104c001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 380 for DMZ:74.125.227.20/20486 to identity:10.11.12.2/10000 duration 0:00:00 bytes 396 Flow closed by inspection&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 17:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073986#M396636</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-10-29T17:43:39Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073987#M396639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the interesting facts from the debugs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-7-715065: Group = DefaultRAGroup, IP = 74.125.227.20, IKE AM Responder FSM error history (struct &amp;amp;0xcbf25fe0)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_SND_MSG2, EV_SND_MSG--&amp;gt;AM_SND_MSG2, EV_START_TMR--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_TRL--&amp;gt;AM_BLD_MSG2, EV_SKEYID_OK--&amp;gt;AM_BLD_MSG2, NullEvent--&amp;gt;AM_BLD_MSG2, EV_GEN_SKEYID--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_HDR&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA AM:7d9c0b7a terminating:&amp;nbsp; flags 0x0104c001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the show crypto isakmp sa while you try to connect and share the output you get ( try to do it several times so we can see where it gets stuck)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 17:58:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073987#M396639</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-29T17:58:41Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073988#M396641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I get the following after and during each connection attempt:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RemoteVPNASA(config)# show crypto isakmp sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are no IKEv1 SAs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the log from the attempts:&lt;/P&gt;&lt;P&gt;%ASA-5-111008: User 'enable_15' executed the 'clear logging buffer' command.&lt;/P&gt;&lt;P&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.10.1.23, executed 'clear logging buffer'&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show logging&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show crypto isakmp sa&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host DMZ:74.125.227.20&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host identity:10.11.12.2&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 401 for DMZ:74.125.227.20/59541 (74.125.227.20/59541) to identity:10.11.12.2/10000 (10.11.12.2/10000)&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 402 for DMZ:74.125.227.20/59541 (74.125.227.20/59541) to identity:10.11.12.2/500 (10.11.12.2/500)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 829&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 74.125.227.20, Responder: IPSec over TCP encapsulation is used&amp;nbsp;&amp;nbsp;&amp;nbsp; local TCP port: 10000&amp;nbsp;&amp;nbsp;&amp;nbsp; peer TCP port:&amp;nbsp; 59541&amp;nbsp; &lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ISA_KE payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received xauth V6 VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received DPD VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Fragmentation VID&lt;/P&gt;&lt;P&gt;%ASA-7-715064: IP = 74.125.227.20, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 with unknown tunnel group name 'user'.&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715028: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ISAKMP SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, Generating keys for Responder...&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = DefaultRAGroup, IP = 74.125.227.20, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Cisco Unity VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing xauth V6 VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing dpd vid payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Fragmentation VID + extended capabilities payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715048: Group = DefaultRAGroup, IP = 74.125.227.20, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 372&lt;/P&gt;&lt;P&gt;%ASA-7-715065: Group = DefaultRAGroup, IP = 74.125.227.20, IKE AM Responder FSM error history (struct &amp;amp;0xcb64b900)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_SND_MSG2, EV_SND_MSG--&amp;gt;AM_SND_MSG2, EV_START_TMR--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_TRL--&amp;gt;AM_BLD_MSG2, EV_SKEYID_OK--&amp;gt;AM_BLD_MSG2, NullEvent--&amp;gt;AM_BLD_MSG2, EV_GEN_SKEYID--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_HDR&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA AM:4448d481 terminating:&amp;nbsp; flags 0x0104c001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 401 for DMZ:74.125.227.20/59541 to identity:10.11.12.2/10000 duration 0:00:00 bytes 396 Flow closed by inspection&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show crypto isakmp sa&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 403 for DMZ:74.125.227.20/59702 (74.125.227.20/59702) to identity:10.11.12.2/10000 (10.11.12.2/10000)&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 404 for DMZ:74.125.227.20/59702 (74.125.227.20/59702) to identity:10.11.12.2/500 (10.11.12.2/500)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 829&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 74.125.227.20, Responder: IPSec over TCP encapsulation is used&amp;nbsp;&amp;nbsp;&amp;nbsp; local TCP port: 10000&amp;nbsp;&amp;nbsp;&amp;nbsp; peer TCP port:&amp;nbsp; 59702&amp;nbsp; &lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ISA_KE payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received xauth V6 VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received DPD VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Fragmentation VID&lt;/P&gt;&lt;P&gt;%ASA-7-715064: IP = 74.125.227.20, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 with unknown tunnel group name 'user'.&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715028: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ISAKMP SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, Generating keys for Responder...&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = DefaultRAGroup, IP = 74.125.227.20, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Cisco Unity VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing xauth V6 VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing dpd vid payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Fragmentation VID + extended capabilities payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715048: Group = DefaultRAGroup, IP = 74.125.227.20, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 372&lt;/P&gt;&lt;P&gt;%ASA-7-715065: Group = DefaultRAGroup, IP = 74.125.227.20, IKE AM Responder FSM error history (struct &amp;amp;0xcb64bc80)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_SND_MSG2, EV_SND_MSG--&amp;gt;AM_SND_MSG2, EV_START_TMR--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_TRL--&amp;gt;AM_BLD_MSG2, EV_SKEYID_OK--&amp;gt;AM_BLD_MSG2, NullEvent--&amp;gt;AM_BLD_MSG2, EV_GEN_SKEYID--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_HDR&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA AM:29c8051d terminating:&amp;nbsp; flags 0x0104c001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 403 for DMZ:74.125.227.20/59702 to identity:10.11.12.2/10000 duration 0:00:01 bytes 396 Flow closed by inspection&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 405 for DMZ:74.125.227.20/59774 (74.125.227.20/59774) to identity:10.11.12.2/10000 (10.11.12.2/10000)&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 406 for DMZ:74.125.227.20/59774 (74.125.227.20/59774) to identity:10.11.12.2/500 (10.11.12.2/500)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 829&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 74.125.227.20, Responder: IPSec over TCP encapsulation is used&amp;nbsp;&amp;nbsp;&amp;nbsp; local TCP port: 10000&amp;nbsp;&amp;nbsp;&amp;nbsp; peer TCP port:&amp;nbsp; 59774&amp;nbsp; &lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ISA_KE payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received xauth V6 VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received DPD VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Fragmentation VID&lt;/P&gt;&lt;P&gt;%ASA-7-715064: IP = 74.125.227.20, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 with unknown tunnel group name 'user'.&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715028: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ISAKMP SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, Generating keys for Responder...&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = DefaultRAGroup, IP = 74.125.227.20, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Cisco Unity VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing xauth V6 VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing dpd vid payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Fragmentation VID + extended capabilities payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715048: Group = DefaultRAGroup, IP = 74.125.227.20, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 372&lt;/P&gt;&lt;P&gt;%ASA-7-715065: Group = DefaultRAGroup, IP = 74.125.227.20, IKE AM Responder FSM error history (struct &amp;amp;0xcb64bc80)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_SND_MSG2, EV_SND_MSG--&amp;gt;AM_SND_MSG2, EV_START_TMR--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_TRL--&amp;gt;AM_BLD_MSG2, EV_SKEYID_OK--&amp;gt;AM_BLD_MSG2, NullEvent--&amp;gt;AM_BLD_MSG2, EV_GEN_SKEYID--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_HDR&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA AM:67fd2fff terminating:&amp;nbsp; flags 0x0104c001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 405 for DMZ:74.125.227.20/59774 to identity:10.11.12.2/10000 duration 0:00:01 bytes 396 Flow closed by inspection&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 407 for DMZ:74.125.227.20/59889 (74.125.227.20/59889) to identity:10.11.12.2/10000 (10.11.12.2/10000)&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 408 for DMZ:74.125.227.20/59889 (74.125.227.20/59889) to identity:10.11.12.2/500 (10.11.12.2/500)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 829&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 74.125.227.20, Responder: IPSec over TCP encapsulation is used&amp;nbsp;&amp;nbsp;&amp;nbsp; local TCP port: 10000&amp;nbsp;&amp;nbsp;&amp;nbsp; peer TCP port:&amp;nbsp; 59889&amp;nbsp; &lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ISA_KE payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received xauth V6 VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received DPD VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Fragmentation VID&lt;/P&gt;&lt;P&gt;%ASA-7-715064: IP = 74.125.227.20, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 74.125.227.20, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 74.125.227.20, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 with unknown tunnel group name 'user'.&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715028: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ISAKMP SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, Generating keys for Responder...&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = DefaultRAGroup, IP = 74.125.227.20, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Cisco Unity VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing xauth V6 VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing dpd vid payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing Fragmentation VID + extended capabilities payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = DefaultRAGroup, IP = 74.125.227.20, constructing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715048: Group = DefaultRAGroup, IP = 74.125.227.20, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 74.125.227.20, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 372&lt;/P&gt;&lt;P&gt;%ASA-7-715065: Group = DefaultRAGroup, IP = 74.125.227.20, IKE AM Responder FSM error history (struct &amp;amp;0xcb64bc80)&amp;nbsp; &lt;STATE&gt;, &lt;EVENT&gt;:&amp;nbsp; AM_DONE, EV_ERROR--&amp;gt;AM_SND_MSG2, EV_SND_MSG--&amp;gt;AM_SND_MSG2, EV_START_TMR--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_TRL--&amp;gt;AM_BLD_MSG2, EV_SKEYID_OK--&amp;gt;AM_BLD_MSG2, NullEvent--&amp;gt;AM_BLD_MSG2, EV_GEN_SKEYID--&amp;gt;AM_BLD_MSG2, EV_BLD_MSG2_HDR&lt;/EVENT&gt;&lt;/STATE&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, IKE SA AM:e5c37c1d terminating:&amp;nbsp; flags 0x0104c001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = DefaultRAGroup, IP = 74.125.227.20, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 407 for DMZ:74.125.227.20/59889 to identity:10.11.12.2/10000 duration 0:00:00 bytes 396 Flow closed by inspection&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show crypto isakmp sa&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show crypto isakmp sa&lt;/P&gt;&lt;P&gt;%ASA-6-302016: Teardown UDP connection 402 for DMZ:74.125.227.20/59541 to identity:10.11.12.2/500 duration 0:02:01 bytes 845&lt;/P&gt;&lt;P&gt;%ASA-6-302016: Teardown UDP connection 404 for DMZ:74.125.227.20/59702 to identity:10.11.12.2/500 duration 0:02:01 bytes 845&lt;/P&gt;&lt;P&gt;%ASA-6-302016: Teardown UDP connection 406 for DMZ:74.125.227.20/59774 to identity:10.11.12.2/500 duration 0:02:02 bytes 845&lt;/P&gt;&lt;P&gt;%ASA-6-302016: Teardown UDP connection 408 for DMZ:74.125.227.20/59889 to identity:10.11.12.2/500 duration 0:02:01 bytes 845&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host DMZ:74.125.227.20 duration 0:02:16&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host identity:10.11.12.2 duration 0:02:16&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 18:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073988#M396641</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-10-29T18:30:36Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073989#M396642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the updated configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you take out the crypto ikev1 ipsec-over-tcp port 10000, does it work over UDP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 18:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073989#M396642</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-29T18:48:36Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073990#M396643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the current cofig:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname RemoteVPNASA&lt;/P&gt;&lt;P&gt;domain-name Domain.local&lt;/P&gt;&lt;P&gt;enable password EknDlaH/tYor46kT encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.76 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.11.12.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd &lt;/P&gt;&lt;P&gt;banner motd +----------------------------------------------------+&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; *** Unauthorized Use or Access Prohibited ***&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; For Authorized Official Use Only&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; You must have explicit permission to access or&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; configure this device. All activities performed&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; on this device may be logged, and violations of&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd | this policy may result in disciplinary action, and |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; may be reported to law enforcement authorities.&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; There is no right to privacy on this device.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd +----------------------------------------------------+&lt;/P&gt;&lt;P&gt;banner motd &lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name Domain.local&lt;/P&gt;&lt;P&gt;object network Network-10.11.12.0&lt;/P&gt;&lt;P&gt; subnet 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group icmp-type DefaultICMP&lt;/P&gt;&lt;P&gt; description Default ICMP Types permitted&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel remark ACL for VPN Split Tunnel&lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 10.10.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 10.11.12.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 5.5.0.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 5.5.16.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list nonat remark ACL for Nat Bypass&lt;/P&gt;&lt;P&gt;access-list nonat extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_2 &lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended permit icmp any any object-group DefaultICMP &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffer-size 524288&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 200&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip local pool IPPool 10.11.12.150-10.11.12.200&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static any any destination static Network-10.11.12.0 Network-10.11.12.0&lt;/P&gt;&lt;P&gt;access-group acl_DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;route DMZ 0.0.0.0 0.0.0.0 10.11.12.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.10.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;sysopt connection preserve-vpn-flows&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set FirstSet esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map DynamicMap 1 set ikev1 transform-set FirstSet&lt;/P&gt;&lt;P&gt;crypto dynamic-map DynamicMap 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map NetMap 1 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map NetMap interface DMZ&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto ikev1 enable inside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable DMZ&lt;/P&gt;&lt;P&gt;crypto ikev1 ipsec-over-tcp port 10000 &lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 43200&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 11&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy Network internal&lt;/P&gt;&lt;P&gt;group-policy Network attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 120&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value vpn_SplitTunnel&lt;/P&gt;&lt;P&gt;username user password HTfNe5Yf7OKVfTLO encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA general-attributes&lt;/P&gt;&lt;P&gt; address-pool IPPool&lt;/P&gt;&lt;P&gt; default-group-policy Network&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:84afd7a2bcd6a7bc321dcf16f1376e85&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The result (no connection) is the same if I check UDP on the client. I'd prefer to keep it TCP tho.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 19:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073990#M396643</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-10-29T19:56:39Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073991#M396644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make the configuration more clear and readable can we take out the Inside interface from the VPN perspective:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;no crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;no crypto ikev1 enable inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not see anything wrong on the configuration, pretty interesting but on the debugs we are going to the default-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-4-713255: IP = 74.125.227.20, Received ISAKMP Aggressive Mode message 1 &lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt;with unknown tunnel group name 'user'.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-7-715047: Group = DefaultRAGroup, IP = 74.125.227.20, processing IKE SA payload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That unknown tunnel group I do not like it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you paste an screenshot about where are you trying to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should set on your VPN client&lt;/P&gt;&lt;P&gt;NetworkRA &lt;/P&gt;&lt;P&gt;Preshared-key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2012 23:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073991#M396644</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-29T23:14:27Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073992#M396645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah...the internal stuff I did through the ASDM in order to troubleshoot. Its all removed now. My VPN client is the Cisco VPN client - Version 5.0.07.0440&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/2/7/109725-VPN-Client-Info.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;There isnt anywhere to set the Preshared-Key for NetworkRA. Please explain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2012 14:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073992#M396645</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-10-30T14:21:58Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073993#M396646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Go to New&lt;/P&gt;&lt;P&gt;Connection entry : Just how you want to name it&lt;/P&gt;&lt;P&gt;host: DMZ ip address&lt;/P&gt;&lt;P&gt;Group authentication &lt;/P&gt;&lt;P&gt;Name: Tunnel-group of the ASA (NetworkRA)&lt;/P&gt;&lt;P&gt;Password: Preshared key&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts, If you do not know how to do it just let me know and I will show you &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2012 17:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073993#M396646</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-30T17:15:12Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073994#M396647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well I clicked correct answer too quickly...The client connects now, but I cannot access anything on the internal network 10.10.1.0/24... So what should I look at now?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 12:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073994#M396647</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-10-31T12:10:49Z</dc:date>
    </item>
    <item>
      <title>Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073995#M396648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well we can connect now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; That is really good!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you cannot access anything on your internal network!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets start from there:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network internal_subnet&lt;/P&gt;&lt;P&gt;networ 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,dmz) source static internal_subnet&amp;nbsp; internal_subnet destination Network-10.11.12.0&amp;nbsp; Network-10.11.12.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,DMZ) source static any any destination static Network-10.11.12.0 Network-10.11.12.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2012 17:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073995#M396648</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-31T17:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073996#M396649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes - I very much agree that the client can connect is a very big step to getting this to work. I applied the changes you listed and I am still not able to connect here's the log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syslog logging: enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facility: 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timestamp logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug-trace logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Console logging: level debugging, 61342 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Monitor logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Buffer logging: level debugging, 61344 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trap logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit-hostdown logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; History logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device ID: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM logging: level informational, 5469 messages logged&lt;/P&gt;&lt;P&gt;%ASA-5-111008: User 'enable_15' executed the 'clear logging buffer' command.&lt;/P&gt;&lt;P&gt;%ASA-5-111010: User 'enable_15', running 'CLI' from IP 10.10.1.23, executed 'clear logging buffer'&lt;/P&gt;&lt;P&gt;%ASA-7-111009: User 'enable_15' executed cmd: show logging&lt;/P&gt;&lt;P&gt;%ASA-5-611103: User logged out: Uname: user&lt;/P&gt;&lt;P&gt;%ASA-6-315011: SSH session from 10.10.1.23 on interface inside for user "user" terminated normally&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 468 for inside:10.10.1.23/43355 to identity:10.10.1.76/22 duration 0:02:30 bytes 105260 TCP Reset-O&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:10.10.1.23 duration 0:02:30&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host identity:10.10.1.76 duration 0:02:30&lt;/P&gt;&lt;P&gt;%ASA-6-106015: Deny TCP (no connection) from 10.10.1.23/43355 to 10.10.1.76/22 flags FIN PSH ACK&amp;nbsp; on interface inside&lt;/P&gt;&lt;P&gt;%ASA-7-710005: TCP request discarded from 10.10.1.23/43355 to inside:10.10.1.76/22&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host DMZ:76.199.251.254&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host identity:10.11.12.2&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 469 for DMZ:76.199.251.254/25283 (76.199.251.254/25283) to identity:10.11.12.2/10000 (10.11.12.2/10000)&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 470 for DMZ:76.199.251.254/25283 (76.199.251.254/25283) to identity:10.11.12.2/500 (10.11.12.2/500)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 832&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 76.199.251.254, Responder: IPSec over TCP encapsulation is used&amp;nbsp;&amp;nbsp;&amp;nbsp; local TCP port: 10000&amp;nbsp;&amp;nbsp;&amp;nbsp; peer TCP port:&amp;nbsp; 25283&amp;nbsp; &lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing ISA_KE payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 76.199.251.254, Received xauth V6 VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 76.199.251.254, Received DPD VID&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 76.199.251.254, Received Fragmentation VID&lt;/P&gt;&lt;P&gt;%ASA-7-715064: IP = 76.199.251.254, IKE Peer included IKE fragmentation capability flags:&amp;nbsp; Main Mode:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp; Aggressive Mode:&amp;nbsp; False&lt;/P&gt;&lt;P&gt;%ASA-7-715047: IP = 76.199.251.254, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: IP = 76.199.251.254, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-7-713906: IP = 76.199.251.254, Connection landed on tunnel_group NetworkRA&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, IP = 76.199.251.254, processing IKE SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715028: Group = NetworkRA, IP = 76.199.251.254, IKE SA Proposal # 1, Transform # 9 acceptable&amp;nbsp; Matches global IKE entry # 1&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing ISAKMP SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing ke payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, IP = 76.199.251.254, Generating keys for Responder...&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = NetworkRA, IP = 76.199.251.254, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing Cisco Unity VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing xauth V6 VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing dpd vid payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing Fragmentation VID + extended capabilities payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715048: Group = NetworkRA, IP = 76.199.251.254, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + KE (4) + NONCE (10) + ID (5) + HASH (8) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 372&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + HASH (8) + NOTIFY (11) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 120&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715076: Group = NetworkRA, IP = 76.199.251.254, Computing hash for ISAKMP&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, IP = 76.199.251.254, processing notify payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, IP = 76.199.251.254, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715038: Group = NetworkRA, IP = 76.199.251.254, Processing IOS/PIX Vendor ID payload (version: 1.0.0, capabilities: 00000408)&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, IP = 76.199.251.254, processing VID payload&lt;/P&gt;&lt;P&gt;%ASA-7-715049: Group = NetworkRA, IP = 76.199.251.254, Received Cisco Unity client VID&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=b5dd0950) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=b5dd0950) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 82&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, IP = 76.199.251.254, process_attr(): Enter!&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, IP = 76.199.251.254, Processing MODE_CFG Reply attributes.&lt;/P&gt;&lt;P&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = user&lt;/P&gt;&lt;P&gt;%ASA-6-113009: AAA retrieved default group policy (Network) for user = user&lt;/P&gt;&lt;P&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = user&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: primary DNS = cleared&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: secondary DNS = cleared&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: primary WINS = cleared&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: secondary WINS = cleared&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: split tunneling list = vpn_SplitTunnel&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: IP Compression = disabled&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: Split Tunneling Policy = Split Network&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: Browser Proxy Setting = no-modify&lt;/P&gt;&lt;P&gt;%ASA-7-715019: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKEGetUserAttributes: Browser Proxy Bypass Local = disable&lt;/P&gt;&lt;P&gt;%ASA-7-734003: DAP: User user, Addr 76.199.251.254: Session Attribute aaa.cisco.grouppolicy = Network&lt;/P&gt;&lt;P&gt;%ASA-7-734003: DAP: User user, Addr 76.199.251.254: Session Attribute aaa.cisco.username = user&lt;/P&gt;&lt;P&gt;%ASA-7-734003: DAP: User user, Addr 76.199.251.254: Session Attribute aaa.cisco.username1 = user&lt;/P&gt;&lt;P&gt;%ASA-7-734003: DAP: User user, Addr 76.199.251.254: Session Attribute aaa.cisco.username2 = &lt;/P&gt;&lt;P&gt;%ASA-7-734003: DAP: User user, Addr 76.199.251.254: Session Attribute aaa.cisco.tunnelgroup = NetworkRA&lt;/P&gt;&lt;P&gt;%ASA-6-734001: DAP: User user, Addr 76.199.251.254, Connection IPSec: The following DAP records were selected for this connection: DfltAccessPolicy&lt;/P&gt;&lt;P&gt; %ASA-7-713052: Group = NetworkRA, Username = user, IP = 76.199.251.254, User (user) authenticated.&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=e90be37a) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 64&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=e90be37a) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 60&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, process_attr(): Enter!&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, Processing cfg ACK attributes&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=588dc5a2) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 174&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, process_attr(): Enter!&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, Processing cfg Request attributes&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for IPV4 address!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for IPV4 net mask!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for DNS server address!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for WINS server address!&lt;/P&gt;&lt;P&gt;%ASA-5-713130: Group = NetworkRA, Username = user, IP = 76.199.251.254, Received unsupported transaction mode attribute: 5&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Banner!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Save PW setting!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Default Domain Name!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Split Tunnel List!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Split DNS!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for PFS setting!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Client Browser Proxy Setting!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for backup ip-sec peer list!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Client Smartcard Removal Disconnect Setting!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for Application Version!&lt;/P&gt;&lt;P&gt;%ASA-6-713184: Group = NetworkRA, Username = user, IP = 76.199.251.254, Client Type: WinNT&amp;nbsp; Client Application Version: 5.0.07.0440&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for FWTYPE!&lt;/P&gt;&lt;P&gt;%ASA-7-715053: Group = NetworkRA, Username = user, IP = 76.199.251.254, MODE_CFG: Received request for DHCP hostname for DDNS is: MARS!&lt;/P&gt;&lt;P&gt;%ASA-7-737001: IPAA: Received message 'UTL_IP_[IKE_]ADDR_REQ'&lt;/P&gt;&lt;P&gt;%ASA-5-737003: IPAA: DHCP configured, no viable servers found for tunnel-group 'NetworkRA'&lt;/P&gt;&lt;P&gt;%ASA-6-737026: IPAA: Client assigned 10.11.12.150 from local pool&lt;/P&gt;&lt;P&gt;%ASA-6-737006: IPAA: Local pool request succeeded for tunnel-group 'NetworkRA'&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, Obtained IP addr (10.11.12.150) prior to initiating Mode Cfg (XAuth enabled)&lt;/P&gt;&lt;P&gt;%ASA-6-713228: Group = NetworkRA, Username = user, IP = 76.199.251.254, Assigned private IP address 10.11.12.150 to remote user&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715055: Group = NetworkRA, Username = user, IP = 76.199.251.254, Send Client Browser Proxy Attributes!&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, Browser Proxy set to No-Modify. Browser Proxy data will NOT be included in the mode-cfg reply&lt;/P&gt;&lt;P&gt;%ASA-7-715055: Group = NetworkRA, Username = user, IP = 76.199.251.254, Send Cisco Smartcard Removal Disconnect enable!!&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=588dc5a2) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 241&lt;/P&gt;&lt;P&gt;%ASA-7-714003: IP = 76.199.251.254, IKE Responder starting QM: msg id = 9db6fb00&lt;/P&gt;&lt;P&gt;%ASA-7-715021: Group = NetworkRA, Username = user, IP = 76.199.251.254, Delay Quick Mode processing, Cert/Trans Exch/RM DSID in progress&lt;/P&gt;&lt;P&gt;%ASA-6-713905: Group = NetworkRA, Username = user, IP = 76.199.251.254, Gratuitous ARP sent for 10.11.12.150&lt;/P&gt;&lt;P&gt;%ASA-7-746012: user-identity: Add IP-User mapping 10.11.12.150 - LOCAL\user Succeeded - VPN user&lt;/P&gt;&lt;P&gt;%ASA-7-746012: user-identity: Add IP-User mapping 76.199.251.254 - LOCAL\user Succeeded - VPN user&lt;/P&gt;&lt;P&gt;%ASA-7-746012: user-identity: Add IP-User mapping 76.199.251.254 - LOCAL\user Succeeded - VPN user&lt;/P&gt;&lt;P&gt;%ASA-7-715022: Group = NetworkRA, Username = user, IP = 76.199.251.254, Resume Quick Mode processing, Cert/Trans Exch/RM DSID completed&lt;/P&gt;&lt;P&gt;%ASA-5-713119: Group = NetworkRA, Username = user, IP = 76.199.251.254, PHASE 1 COMPLETED&lt;/P&gt;&lt;P&gt;%ASA-7-713121: IP = 76.199.251.254, Keep-alive type for this connection: DPD&lt;/P&gt;&lt;P&gt;%ASA-7-715080: Group = NetworkRA, Username = user, IP = 76.199.251.254, Starting P1 rekey timer: 41040 seconds.&lt;/P&gt;&lt;P&gt;%ASA-7-746012: user-identity: Add IP-User mapping 76.199.251.254 - LOCAL\user Succeeded - VPN user&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, sending notify message&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=22ab08a8) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 88&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=9db6fb00) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NONE (0) total length : 1026&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-714011: Group = NetworkRA, Username = user, IP = 76.199.251.254, ID_IPV4_ADDR ID received&lt;/P&gt;&lt;P&gt;10.11.12.150&lt;/P&gt;&lt;P&gt;%ASA-7-713025: Group = NetworkRA, Username = user, IP = 76.199.251.254, Received remote Proxy Host data in ID Payload:&amp;nbsp; Address 10.11.12.150, Protocol 0, Port 0&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing ID payload&lt;/P&gt;&lt;P&gt;%ASA-7-714011: Group = NetworkRA, Username = user, IP = 76.199.251.254, ID_IPV4_ADDR_SUBNET ID received--0.0.0.0--0.0.0.0&lt;/P&gt;&lt;P&gt;%ASA-7-713034: Group = NetworkRA, Username = user, IP = 76.199.251.254, Received local IP Proxy Subnet data in ID Payload:&amp;nbsp;&amp;nbsp; Address 0.0.0.0, Mask 0.0.0.0, Protocol 0, Port 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, QM IsRekeyed old sa not found by addr&lt;/P&gt;&lt;P&gt;%ASA-7-713066: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE Remote Peer configured for crypto map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing IPSec SA payload&lt;/P&gt;&lt;P&gt;%ASA-7-715027: Group = NetworkRA, Username = user, IP = 76.199.251.254, IPSec SA Proposal # 8, Transform # 1 acceptable&amp;nbsp; Matches global IPSec SA entry # 65535&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE: requesting SPI!&lt;/P&gt;&lt;P&gt;%ASA-7-715006: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE got SPI from key engine: SPI = 0x2a9e7c0a&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, oakley constucting quick mode&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing IPSec SA payload&lt;/P&gt;&lt;P&gt;%ASA-5-713075: Group = NetworkRA, Username = user, IP = 76.199.251.254, Overriding Initiator's IPSec rekeying duration from 2147483 to 28800 seconds&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing IPSec nonce payload&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing proxy ID&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, Transmitting Proxy Id:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Remote host: 10.11.12.150&amp;nbsp; Protocol 0&amp;nbsp; Port 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Local subnet:&amp;nbsp; 0.0.0.0&amp;nbsp; mask 0.0.0.0 Protocol 0&amp;nbsp; Port 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, Sending RESPONDER LIFETIME notification to Initiator&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-714005: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE Responder sending 2nd QM pkt: msg id = 9db6fb00&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=9db6fb00) with payloads : HDR + HASH (8) + SA (1) + NONCE (10) + ID (5) + ID (5) + NOTIFY (11) + NONE (0) total length : 184&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=9db6fb00) with payloads : HDR + HASH (8) + NONE (0) total length : 52&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, loading all IPSEC SAs&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, Generating Quick Mode Key!&lt;/P&gt;&lt;P&gt;%ASA-7-715001: Group = NetworkRA, Username = user, IP = 76.199.251.254, Generating Quick Mode Key!&lt;/P&gt;&lt;P&gt;%ASA-5-713049: Group = NetworkRA, Username = user, IP = 76.199.251.254, Security negotiation complete for User (user)&amp;nbsp; Responder, Inbound SPI = 0x2a9e7c0a, Outbound SPI = 0x5bb276fb&lt;/P&gt;&lt;P&gt;%ASA-6-602303: IPSEC: An outbound remote access SA (SPI= 0x5BB276FB) between 10.11.12.2 and 76.199.251.254 (user= user) has been created.&lt;/P&gt;&lt;P&gt;%ASA-7-715007: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE got a KEY_ADD msg for SA: SPI = 0x5bb276fb&lt;/P&gt;&lt;P&gt;%ASA-7-746012: user-identity: Add IP-User mapping 76.199.251.254 - LOCAL\user Succeeded - VPN user&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host DMZ:10.11.12.150&lt;/P&gt;&lt;P&gt;%ASA-6-602303: IPSEC: An inbound remote access SA (SPI= 0x2A9E7C0A) between 10.11.12.2 and 76.199.251.254 (user= user) has been created.&lt;/P&gt;&lt;P&gt;%ASA-7-715077: Group = NetworkRA, Username = user, IP = 76.199.251.254, Pitcher: received KEY_UPDATE, spi 0x2a9e7c0a&lt;/P&gt;&lt;P&gt;%ASA-7-715080: Group = NetworkRA, Username = user, IP = 76.199.251.254, Starting P2 rekey timer: 27360 seconds.&lt;/P&gt;&lt;P&gt;%ASA-7-713204: Group = NetworkRA, Username = user, IP = 76.199.251.254, Adding static route for client address: 10.11.12.150 &lt;/P&gt;&lt;P&gt;%ASA-5-713120: Group = NetworkRA, Username = user, IP = 76.199.251.254, PHASE 2 COMPLETED (msgid=9db6fb00)&lt;/P&gt;&lt;P&gt;%ASA-7-746012: user-identity: Add IP-User mapping 76.199.251.254 - LOCAL\user Succeeded - VPN user&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=74c94d21) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing notify payload&lt;/P&gt;&lt;P&gt;%ASA-7-715075: Group = NetworkRA, Username = user, IP = 76.199.251.254, Received keep-alive of type DPD R-U-THERE (seq number 0x4e4417ba)&lt;/P&gt;&lt;P&gt;%ASA-7-715036: Group = NetworkRA, Username = user, IP = 76.199.251.254, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x4e4417ba)&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=eda5977f) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:10.10.1.44&lt;/P&gt;&lt;P&gt;%ASA-6-302015: Built inbound UDP connection 472 for DMZ:10.11.12.150/427 (10.11.12.150/427)(LOCAL\user) to inside:10.10.1.44/427 (10.10.1.44/427) (user)&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:10.10.1.76&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 473 for DMZ:10.11.12.150/43618 (10.11.12.150/43618)(LOCAL\user) to inside:10.10.1.76/22 (10.10.1.76/22) (user)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=c168a18) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing notify payload&lt;/P&gt;&lt;P&gt;%ASA-7-715075: Group = NetworkRA, Username = user, IP = 76.199.251.254, Received keep-alive of type DPD R-U-THERE (seq number 0x4e4417bb)&lt;/P&gt;&lt;P&gt;%ASA-7-715036: Group = NetworkRA, Username = user, IP = 76.199.251.254, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x4e4417bb)&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=50284dae) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:10.10.1.26&lt;/P&gt;&lt;P&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:10.10.1.26 duration 0:00:02&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:10.10.1.26&lt;/P&gt;&lt;P&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=29354099) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing notify payload&lt;/P&gt;&lt;P&gt;%ASA-7-715075: Group = NetworkRA, Username = user, IP = 76.199.251.254, Received keep-alive of type DPD R-U-THERE (seq number 0x4e4417bc)&lt;/P&gt;&lt;P&gt;%ASA-7-715036: Group = NetworkRA, Username = user, IP = 76.199.251.254, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x4e4417bc)&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=1bca2b2) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:10.10.1.26 duration 0:00:02&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:10.10.1.26&lt;/P&gt;&lt;P&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:10.10.1.26 duration 0:00:02&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:10.10.1.26&lt;/P&gt;&lt;P&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=a6c91f9d) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing notify payload&lt;/P&gt;&lt;P&gt;%ASA-7-715075: Group = NetworkRA, Username = user, IP = 76.199.251.254, Received keep-alive of type DPD R-U-THERE (seq number 0x4e4417bd)&lt;/P&gt;&lt;P&gt;%ASA-7-715036: Group = NetworkRA, Username = user, IP = 76.199.251.254, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x4e4417bd)&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=83836fa9) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 84&lt;/P&gt;&lt;P&gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.11.12.150/1(LOCAL\user) gaddr 10.10.1.26/0 laddr 10.10.1.26/0 (user)&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:10.10.1.26 duration 0:00:02&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 473 for DMZ:10.11.12.150/43618(LOCAL\user) to inside:10.10.1.76/22 duration 0:00:30 bytes 0 SYN Timeout (user)&lt;/P&gt;&lt;P&gt;%ASA-7-609002: Teardown local-host inside:10.10.1.76 duration 0:00:30&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE RECEIVED Message (msgid=2a7b85a0) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 72&lt;/P&gt;&lt;P&gt;%ASA-7-715047: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, processing delete&lt;/P&gt;&lt;P&gt;%ASA-5-713050: Group = NetworkRA, Username = user, IP = 76.199.251.254, Connection terminated for peer user.&amp;nbsp; Reason: Peer Terminate&amp;nbsp; Remote Proxy 10.11.12.150, Local Proxy 0.0.0.0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, Active unit receives a delete event for remote peer 76.199.251.254.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-715009: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE Deleting SA: Remote Proxy 10.11.12.150, Local Proxy 0.0.0.0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE SA AM:68e753d7 rcv'd Terminate: state AM_ACTIVE&amp;nbsp; flags 0x2861d041, refcnt 1, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, IKE SA AM:68e753d7 terminating:&amp;nbsp; flags 0x2961d001, refcnt 0, tuncnt 0&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Group = NetworkRA, Username = user, IP = 76.199.251.254, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;%ASA-6-602304: IPSEC: An outbound remote access SA (SPI= 0x5BB276FB) between 10.11.12.2 and 76.199.251.254 (user= user) has been deleted.&lt;/P&gt;&lt;P&gt;%ASA-6-602304: IPSEC: An inbound remote access SA (SPI= 0x2A9E7C0A) between 76.199.251.254 and 10.11.12.2 (user= user) has been deleted.&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing blank hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing IKE delete payload&lt;/P&gt;&lt;P&gt;%ASA-7-715046: Group = NetworkRA, Username = user, IP = 76.199.251.254, constructing qm hash payload&lt;/P&gt;&lt;P&gt;%ASA-7-713236: IP = 76.199.251.254, IKE_DECODE SENDING Message (msgid=a9a78dd5) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;/P&gt;&lt;P&gt;%ASA-7-715077: Pitcher: received key delete msg, spi 0x2a9e7c0a&lt;/P&gt;&lt;P&gt;%ASA-7-715077: Pitcher: received key delete msg, spi 0x2a9e7c0a&lt;/P&gt;&lt;P&gt;%ASA-5-713259: Group = NetworkRA, Username = user, IP = 76.199.251.254, Session is being torn down. Reason: User Requested&lt;/P&gt;&lt;P&gt;%ASA-6-713273: Group = NetworkRA, Username = user, IP = 76.199.251.254, Deleting static route for client address: 10.11.12.150 &lt;/P&gt;&lt;P&gt;%ASA-7-746013: user-identity: Delete IP-User mapping 76.199.251.254 - LOCAL\user Failed - VPN user logout&lt;/P&gt;&lt;P&gt;%ASA-7-746013: user-identity: Delete IP-User mapping 10.11.12.150 - LOCAL\user Succeeded - VPN user logout&lt;/P&gt;&lt;P&gt;%ASA-4-113019: Group = NetworkRA, Username = user, IP = 76.199.251.254, Session disconnected. Session Type: IPsecOverTCP, Duration: 0h:00m:52s, Bytes xmt: 0, Bytes rcv: 536, Reason: User Requested&lt;/P&gt;&lt;P&gt;%ASA-7-713906: Ignoring msg to mark SA with dsID 45056 dead because SA deleted&lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 469 for DMZ:76.199.251.254/25283 to identity:10.11.12.2/10000 duration 0:00:53 bytes 1724 Flow closed by inspection&lt;/P&gt;&lt;P&gt;%ASA-6-106015: Deny TCP (no connection) from 76.199.251.254/25283 to 10.11.12.2/10000 flags ACK&amp;nbsp; on interface DMZ&lt;/P&gt;&lt;P&gt;%ASA-7-710005: TCP request discarded from 76.199.251.254/25283 to DMZ:10.11.12.2/10000&lt;/P&gt;&lt;P&gt;%ASA-6-737016: IPAA: Freeing local pool address 10.11.12.150&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host inside:10.10.1.23&lt;/P&gt;&lt;P&gt;%ASA-7-609001: Built local-host identity:10.10.1.76&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built inbound TCP connection 478 for inside:10.10.1.23/43785 (10.10.1.23/43785) to identity:10.10.1.76/22 (10.10.1.76/22)&lt;/P&gt;&lt;P&gt;%ASA-6-113012: AAA user authentication Successful : local database : user = user&lt;/P&gt;&lt;P&gt;%ASA-6-113008: AAA transaction status ACCEPT : user = user&lt;/P&gt;&lt;P&gt;%ASA-6-611101: User authentication succeeded: Uname: user&lt;/P&gt;&lt;P&gt;%ASA-6-611101: User authentication succeeded: Uname: user&lt;/P&gt;&lt;P&gt;%ASA-6-605005: Login permitted from 10.10.1.23/43785 to inside:10.10.1.76/ssh for user "user"&lt;/P&gt;&lt;P&gt;%ASA-5-502103: User priv level changed: Uname: enable_15 From: 1 To: 15&lt;/P&gt;&lt;P&gt;%ASA-5-111008: User 'user' executed the 'enable' command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know what you think.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2012 13:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073996#M396649</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-11-01T13:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073997#M396650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know I have asked for it so many times but I will need to see the updated configuration &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share it again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2012 18:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073997#M396650</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-01T18:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073998#M396651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to add some details here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the logs:&lt;/P&gt;&lt;P&gt;%ASA-5-713119: Group = NetworkRA, Username = user, IP = 76.199.251.254, PHASE 1 COMPLETED&lt;BR /&gt;%ASA-5-713120: Group = NetworkRA, Username = user, IP = 76.199.251.254, PHASE 2 COMPLETED&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we know Phase I &amp;amp; II are OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However:&lt;/P&gt;&lt;P&gt;%ASA-7-710005: TCP request discarded from 76.199.251.254/25283 to DMZ:10.11.12.2/10000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the following command enabled?&lt;/P&gt;&lt;P&gt; hostname(config)# &lt;STRONG&gt;crypto ikev1 ipsec-over-tcp port 10000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any NAT rule causing a conflict?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Recommendation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do recommend NAT-T since it performs much better. Besides that, cTCP connections are known to have issues across FWs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bc6d4c.shtml"&gt;IPsec over TCP Fails when Traffic Flows through ASA&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Portu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate any helpful posts &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 00:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073998#M396651</guid>
      <dc:creator>Javier Portuguez</dc:creator>
      <dc:date>2012-11-02T00:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073999#M396652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's my current running config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname RemoteVPNASA&lt;/P&gt;&lt;P&gt;domain-name Domain.local&lt;/P&gt;&lt;P&gt;enable password EknDlaH/tYor46kT encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.76 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.11.12.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd &lt;/P&gt;&lt;P&gt;banner motd +----------------------------------------------------+&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; *** Unauthorized Use or Access Prohibited ***&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; For Authorized Official Use Only&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; You must have explicit permission to access or&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; configure this device. All activities performed&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; on this device may be logged, and violations of&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd | this policy may result in disciplinary action, and |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp; may be reported to law enforcement authorities.&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp; There is no right to privacy on this device.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;banner motd +----------------------------------------------------+&lt;/P&gt;&lt;P&gt;banner motd &lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name Domain.local&lt;/P&gt;&lt;P&gt;object network Network-10.11.12.0&lt;/P&gt;&lt;P&gt; subnet 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Network-10.10.1.0&lt;/P&gt;&lt;P&gt; subnet 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group icmp-type DefaultICMP&lt;/P&gt;&lt;P&gt; description Default ICMP Types permitted&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.11.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel remark ACL for VPN Split Tunnel&lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 10.10.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 10.11.12.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 5.5.0.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list vpn_SplitTunnel standard permit 5.5.16.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list nonat remark ACL for Nat Bypass&lt;/P&gt;&lt;P&gt;access-list nonat extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_2 &lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended permit icmp any any object-group DefaultICMP &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffer-size 524288&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 200&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&amp;nbsp; &lt;/P&gt;&lt;P&gt;ip local pool IPPool 10.11.12.150-10.11.12.200&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static Network-10.10.1.0 Network-10.10.1.0 destination static Network-10.11.12.0 Network-10.11.12.0&lt;/P&gt;&lt;P&gt;access-group acl_DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;route DMZ 0.0.0.0 0.0.0.0 10.11.12.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.10.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;sysopt connection preserve-vpn-flows&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set FirstSet esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map DynamicMap 1 set ikev1 transform-set FirstSet&lt;/P&gt;&lt;P&gt;crypto dynamic-map DynamicMap 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map NetMap 1 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map NetMap interface DMZ&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto ikev1 enable DMZ&lt;/P&gt;&lt;P&gt;crypto ikev1 ipsec-over-tcp port 10000 &lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 43200&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 11&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 10.240.232.0 255.255.252.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy Network internal&lt;/P&gt;&lt;P&gt;group-policy Network attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 120&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value vpn_SplitTunnel&lt;/P&gt;&lt;P&gt;username user password HTfNe5Yf7OKVfTLO encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA general-attributes&lt;/P&gt;&lt;P&gt; address-pool IPPool&lt;/P&gt;&lt;P&gt; default-group-policy Network&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:fdd8944b7886c448137cce902d12b8a3&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@Portu - Yes &lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;crypto ikev1 ipsec-over-tcp port 10000 &lt;/STRONG&gt;is present, whats the command to implement NAT-T? So far its connecting just fine using TCP 10000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 01:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2073999#M396652</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-11-02T01:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2074000#M396653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This NAT rule is the one affecting the traffic, since the pool is in the same network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static any any destination static Network-10.11.12.0 Network-10.11.12.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let´s give it a try as following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool VPN_NetworkRA 192.168.254.1-192.168.254.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group NetworkRA general-attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no address-pool IPPool&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; address-pool VPN_NetworkRA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-192.168.254.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 192.168.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) 1 source static any any destination static obj-192.168.254.0 obj-192.168.254.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to access the network and let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Portu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate any helpful posts &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 02:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2074000#M396653</guid>
      <dc:creator>Javier Portuguez</dc:creator>
      <dc:date>2012-11-02T02:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access IKEv1 VPN DMZ ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2074001#M396654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wont be able to retry the connection attempt until Monday, so I'll update then. Thanks again Julio.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 21:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-ikev1-vpn-dmz-asa/m-p/2074001#M396654</guid>
      <dc:creator>Nathan Hawkins</dc:creator>
      <dc:date>2012-11-02T21:40:51Z</dc:date>
    </item>
  </channel>
</rss>

