<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote access VPN on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655501#M592154</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="font-size: 14pt; "&gt;Can Anyone reply on this post ?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Feb 2011 11:17:07 GMT</pubDate>
    <dc:creator>vinayak</dc:creator>
    <dc:date>2011-02-10T11:17:07Z</dc:date>
    <item>
      <title>Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655495#M592145</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having Cisco ASA 5510 firewall. i configured Remote VPN on Firewall. But when i am connecting from VPN Client (5.0.06). it gives error as &lt;STRONG&gt;"Secure VPN Connection Terminated by Peer Error: 433"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please help me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Config is as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh runn"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(3) &lt;BR /&gt;!&lt;BR /&gt;hostname rama5510&lt;BR /&gt;enable password 2ry13OhtG57zeqsA encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 121.242.223.102 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; no ip address&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;regex Court "\court\.mah\.nic\.in"&lt;BR /&gt;regex Domainlist9 "\idbi\.com"&lt;BR /&gt;regex Nsdl "\.tin-nsdl\.com"&lt;BR /&gt;regex domainlist10 "\.inet\.idbibank\.co\.in"&lt;BR /&gt;regex domainlist11 "\billing\.mahadiscom\.in"&lt;BR /&gt;regex domainlist12 "\igrmaharashtra\.gov\.in"&lt;BR /&gt;regex allow "\.google.\com"&lt;BR /&gt;regex justdail "\search\.justdial\.com"&lt;BR /&gt;regex PCMC "203.129.227.16:8080\.pcmc"&lt;BR /&gt;regex domainlist1 "\.yahoo\.com"&lt;BR /&gt;regex domainlist2 "\.google\.co\.in"&lt;BR /&gt;regex domainlist3 "\.orkut\.com"&lt;BR /&gt;regex punecorporation "\punecorporation\.org"&lt;BR /&gt;regex pcmcindia "\pcmcindia\.gov\.in"&lt;BR /&gt;regex domainlist4 "\.orkut\.co\.in"&lt;BR /&gt;regex domainlist5 "\.facebook\.com"&lt;BR /&gt;regex domainlist6 "\.gmail\.com"&lt;BR /&gt;regex domainlist7 "\.google\.com"&lt;BR /&gt;regex domainlist8 "\mahabhulekh\.mumbai\.nic\.in"&lt;BR /&gt;regex bsnl "\bsnl\.co\.in"&lt;BR /&gt;regex rcom "\myservices\.relianceada\.com"&lt;BR /&gt;regex lic "\licindia\.com"&lt;BR /&gt;regex pcntda "\pcntda\.org\.in"&lt;BR /&gt;regex mahabhulekh "164.100.111.5:8080\.mahabhulekh"&lt;BR /&gt;regex contenttype "content-type"&lt;BR /&gt;regex applicationheader "application/.*"&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 121.242.190.180&lt;BR /&gt; name-server 121.242.190.211&lt;BR /&gt;object-group network allow&lt;BR /&gt; network-object host Amit&lt;BR /&gt; network-object host Vinod&lt;BR /&gt; network-object host Ram&lt;BR /&gt; network-object host server&lt;BR /&gt; network-object host Quadra&lt;BR /&gt; network-object host Hr-2&lt;BR /&gt; network-object host Hr-1&lt;BR /&gt; network-object host SunilSir&lt;BR /&gt; network-object host RonakSirAppleLaptop&lt;BR /&gt; network-object host Suhas&lt;BR /&gt; network-object host 192.168.0.199&lt;BR /&gt; network-object host 192.168.0.12&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq citrix-ica &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 2598 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 37777 &lt;BR /&gt;access-list user-acl extended deny tcp object-group allow any eq 8080 &lt;BR /&gt;access-list user-acl extended deny tcp object-group allow any eq www &lt;BR /&gt;access-list user-acl extended deny tcp any host server eq www &lt;BR /&gt;access-list user-acl extended deny tcp any host server eq 8080 &lt;BR /&gt;access-list user-acl extended deny tcp any host 164.100.111.5 eq www &lt;BR /&gt;access-list user-acl extended deny tcp any host 164.100.111.5 eq 8080 &lt;BR /&gt;access-list user-acl extended permit tcp any any eq www &lt;BR /&gt;access-list user-acl extended permit tcp any any eq 8080 &lt;BR /&gt;access-list user-acl extended deny tcp any host 192.168.0.199 eq www &lt;BR /&gt;access-list user-acl extended deny tcp any host 192.168.0.199 eq 8080 &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host 121.242.223.102 eq www &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host 121.242.223.102 eq 2598 &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host 121.242.223.102 eq citrix-ica &lt;BR /&gt;access-list inside_mpc extended deny tcp object-group allow any eq www &lt;BR /&gt;access-list inside_mpc extended deny tcp object-group allow any eq 8080 &lt;BR /&gt;access-list inside_mpc extended deny tcp any host 164.100.111.5 eq www &lt;BR /&gt;access-list inside_mpc extended deny tcp any host 164.100.111.5 eq 8080 &lt;BR /&gt;access-list inside_mpc extended deny tcp any host server eq www &lt;BR /&gt;access-list inside_mpc extended deny tcp any host server eq 8080 &lt;BR /&gt;access-list inside_mpc extended deny tcp any host 192.168.0.199 eq 8080 &lt;BR /&gt;access-list inside_mpc extended deny ip 192.168.0.0 255.255.255.240 192.168.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_mpc extended deny object-group TCPUDP 192.168.0.0 255.255.255.240 192.168.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_mpc extended deny tcp any host 192.168.0.199 eq www &lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq 8080 &lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq www &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.0.0 255.255.255.240 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool RemoteVPN 192.168.0.2-192.168.0.10&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-603.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface citrix-ica server citrix-ica netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 2598 server 2598 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface www server www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 37777 192.168.0.199 37777 netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 121.242.223.101 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs &lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign local&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.10 inside&lt;BR /&gt;dhcpd dns 121.242.190.180 121.242.190.211 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;group-policy ramagroup internal&lt;BR /&gt;group-policy ramagroup attributes&lt;BR /&gt; dns-server value 121.242.190.180 121.242.190.211&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt;username rama5510 password NQ35L.CrXDGEh3Wo encrypted privilege 15&lt;BR /&gt;username vinayak password hj81.pmVitNx/DEr encrypted privilege 0&lt;BR /&gt;username vinayak attributes&lt;BR /&gt; vpn-group-policy ramagroup&lt;BR /&gt;tunnel-group ramagroup type remote-access&lt;BR /&gt;tunnel-group ramagroup general-attributes&lt;BR /&gt; address-pool RemoteVPN&lt;BR /&gt; default-group-policy ramagroup&lt;BR /&gt;tunnel-group ramagroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map allow-user-class&lt;BR /&gt; match access-list user-acl&lt;BR /&gt;class-map type inspect http match-all appheaderclass&lt;BR /&gt; match request header regex contenttype regex applicationheader&lt;BR /&gt; match req-resp content-type mismatch&lt;BR /&gt;class-map inside-class&lt;BR /&gt; match access-list inside_mpc&lt;BR /&gt;class-map type inspect http match-all allow-url-class&lt;BR /&gt; match not request header host regex domainlist8&lt;BR /&gt; match not request header host regex Domainlist9&lt;BR /&gt; match not request header host regex domainlist10&lt;BR /&gt; match not request header host regex domainlist11&lt;BR /&gt; match not request header host regex domainlist12&lt;BR /&gt; match not request header host regex mahabhulekh&lt;BR /&gt; match not request header host regex Nsdl&lt;BR /&gt; match not request header host regex Court&lt;BR /&gt; match not request header host regex pcntda&lt;BR /&gt; match not request header host regex lic&lt;BR /&gt; match not request header host regex justdail&lt;BR /&gt; match not request header host regex pcmcindia&lt;BR /&gt; match not request header host regex rcom&lt;BR /&gt; match not request header host regex punecorporation&lt;BR /&gt; match not request header host regex PCMC&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map type inspect http allow-url-policy&lt;BR /&gt; parameters&lt;BR /&gt; class allow-url-class&lt;BR /&gt;&amp;nbsp; drop-connection&lt;BR /&gt;policy-map allow-user-url-policy&lt;BR /&gt; class allow-user-class&lt;BR /&gt;&amp;nbsp; inspect http allow-url-policy &lt;BR /&gt;policy-map inside-policy&lt;BR /&gt; class inside-class&lt;BR /&gt;&amp;nbsp; inspect http allow-url-policy &lt;BR /&gt;!&lt;BR /&gt;service-policy inside-policy interface inside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:42a2d5a7c132830439479d26c3be896d&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655495#M592145</guid>
      <dc:creator>vinayak</dc:creator>
      <dc:date>2019-03-11T19:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655496#M592147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vinayak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see the reason why is failing please post the output of &lt;STRONG&gt;debug cry isa 127&lt;/STRONG&gt; and &lt;STRONG&gt;debug cry ips 127&lt;/STRONG&gt; when attempting the VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 14:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655496#M592147</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-02-09T14:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655497#M592149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually i am able to connect to the Public IP of my Network. But then it ask for Username &amp;amp; password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if i enter correct Username &amp;amp; Passwd it Gives the Same Error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 04:56:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655497#M592149</guid>
      <dc:creator>vinayak</dc:creator>
      <dc:date>2011-02-10T04:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655498#M592150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no output for these 2 commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i put command &lt;STRONG&gt;sh crypto ipsec sa -&amp;gt; Output is -&amp;gt; there are no ipsec sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is this means?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 06:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655498#M592150</guid>
      <dc:creator>vinayak</dc:creator>
      <dc:date>2011-02-10T06:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655499#M592152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi VInayak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that your tunnel is not up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please do deb cry isa 127 and debug cry ips 127. then initiate the tunnel . Post the outputs of the debugs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we will look into it and get back&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;anisha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 06:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655499#M592152</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-02-10T06:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655500#M592153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anisha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are the logs that i received.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:19|113012|||AAA user authentication Successful : local database : user = vinayak&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:19|113003|||AAA group policy for user vinayak is being set to ramagroup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:19|113011|||AAA retrieved user specific group policy (ramagroup) for user = vinayak&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:19|113009|||AAA retrieved default group policy (ramagroup) for user = vinayak&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:19|113008|||AAA transaction status ACCEPT : user = vinayak&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:19|734001|||DAP: User vinayak, Addr 114.143.163.232, Connection IPSec: The following DAP records were selected for this connection: DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5|Feb 09 2011|23:43:19|713130|||Group = ramagroup, Username = vinayak, IP = 114.143.163.232, Received unsupported transaction mode attribute: 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:19|713184|||Group = ramagroup, Username = vinayak, IP = 114.143.163.232, Client Type: WinNT&amp;nbsp; Client Application Version: 5.0.06.0160&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Feb 09 2011|23:43:19|713132|||Group = ramagroup, Username = vinayak, IP = 114.143.163.232, Cannot obtain an IP address for remote peer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Feb 09 2011|23:43:19|713902|||Group = ramagroup, Username = vinayak, IP = 114.143.163.232, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4|Feb 09 2011|23:43:19|713903|||Group = ramagroup, Username = vinayak, IP = 114.143.163.232, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4|Feb 09 2011|23:43:19|113019|||Group = , Username = , IP = 0.0.0.0, Session disconnected. Session Type: , Duration: 0h:00m:02s, Bytes xmt: 0, Bytes rcv: 0, Reason: Unknown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Feb 09 2011|23:43:22|106015|192.168.0.78|63.150.131.42|Deny TCP (no connection) from 192.168.0.78/1558 to 63.150.131.42/80 flags PSH ACK&amp;nbsp; on interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 07:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655500#M592153</guid>
      <dc:creator>vinayak</dc:creator>
      <dc:date>2011-02-10T07:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655501#M592154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="font-size: 14pt; "&gt;Can Anyone reply on this post ?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 11:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655501#M592154</guid>
      <dc:creator>vinayak</dc:creator>
      <dc:date>2011-02-10T11:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655502#M592155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vinayaka,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client is not getting the ip address. Do you have a DAP configured? what is it configured as?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 11:34:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655502#M592155</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-02-10T11:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655503#M592156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;DAP is activated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didnt get the statement "What it is configured as" ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 11:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655503#M592156</guid>
      <dc:creator>vinayak</dc:creator>
      <dc:date>2011-02-10T11:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655504#M592157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you click on the DAP and edit it. Check the action defined in the Action type. Please let us know if it is terminate or continue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following link will give you more details about DAP.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_white_paper09186a00809fcf38.shtml#t3"&gt;http://www.cisco.com/en/US/products/ps6120/products_white_paper09186a00809fcf38.shtml#t3&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 04:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655504#M592157</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-02-11T04:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN on ASA</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655505#M592158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anisha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i am connected sucessfully to Remote Network through my VPN Client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am getting IP Also. But now i am only able to access Internal network. I am not able to access internet not @ my side or not @ remote site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is possible to access internet of remote network through Remote VPN ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 05:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-on-asa/m-p/1655505#M592158</guid>
      <dc:creator>vinayak</dc:creator>
      <dc:date>2011-02-11T05:09:01Z</dc:date>
    </item>
  </channel>
</rss>

