<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote access VPN over UDP transport in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404501#M744669</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh.&amp;nbsp; It was that nat-t-disable option that was screwing things up, it didn't need to be there &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still, job done - and thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Philip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Jan 2010 19:34:13 GMT</pubDate>
    <dc:creator>philipplant</dc:creator>
    <dc:date>2010-01-20T19:34:13Z</dc:date>
    <item>
      <title>Remote access VPN over UDP transport</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404498#M744653</link>
      <description>&lt;PRE&gt;Hi folks,

I have a Cisco ASA-5505 running 8.2(1), and I'm trying to configure it for remote access VPN
connections using L2TP over IPsec.&amp;nbsp; It completes Phase 1 with no problem.&amp;nbsp; Then it picks up
the correct dynamic crypto-map, but fails to negotiate an IPsec SA:

Jan 20 18:29:38 [IKEv1]: Group = DefaultRAGroup, IP = x, PHASE 1 COMPLETED
Jan 20 18:29:39 [IKEv1 DEBUG]: Group = DefaultRAGroup, IP = x, processing IPSec SA payload
Jan 20 18:29:39 [IKEv1]: Group = DefaultRAGroup, IP = x, IKE Remote Peer configured for crypto map: x-VPN
Jan 20 18:29:39 [IKEv1]: Phase 2 failure:&amp;nbsp; Mismatched attribute types for class Encapsulation Mode:&amp;nbsp; Rcv'd: UDP Transport&amp;nbsp; Cfg'd: Transport
Jan 20 18:29:39 [IKEv1]: Phase 2 failure:&amp;nbsp; Mismatched attribute types for class Encapsulation Mode:&amp;nbsp; Rcv'd: UDP Transport&amp;nbsp; Cfg'd: Transport
Jan 20 18:29:39 [IKEv1]: Group = DefaultRAGroup, IP = x, All IPSec SA proposals found unacceptable!

So the problem seems to be that the VPN client is requesting UDP transport, but the ASA will not accept it.

Please would someone have a look at these snippets of config and tell me if there's something
I've missed?

crypto isakmp policy 119
 authentication pre-share
 encryption 3des
 hash sha&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
 group 2
 lifetime 86400

crypto ipsec transform-set TRANSPORT_ESP_3DES_SHA esp-3des esp-sha-hmac 
crypto ipsec transform-set TRANSPORT_ESP_3DES_SHA mode transport

crypto dynamic-map x-VPN 10 set transform-set TRANSPORT_ESP_3DES_SHA
crypto dynamic-map x-VPN 10 set nat-t-disable

crypto map IPSECMap 103 ipsec-isakmp dynamic x-VPN

group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
 wins-server value 172.20.0.1
 dns-server value 172.20.0.1
 vpn-tunnel-protocol IPSec l2tp-ipsec 
 ipsec-udp enable
 default-domain value x.local

tunnel-group DefaultRAGroup general-attributes
 address-pool clientVPNpool
 authentication-server-group x
 default-group-policy DefaultRAGroup

Thanks,

Philip
&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404498#M744653</guid>
      <dc:creator>philipplant</dc:creator>
      <dc:date>2019-03-11T16:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN over UDP transport</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404499#M744660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Missing transform-set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 19:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404499#M744660</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-20T19:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN over UDP transport</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404500#M744666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE&gt;Missed that from my config snips above, added now.&amp;nbsp; Any other thoughts please?

Thanks,

Philip
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 19:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404500#M744666</guid>
      <dc:creator>philipplant</dc:creator>
      <dc:date>2010-01-20T19:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN over UDP transport</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404501#M744669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh.&amp;nbsp; It was that nat-t-disable option that was screwing things up, it didn't need to be there &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still, job done - and thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Philip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 19:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-over-udp-transport/m-p/1404501#M744669</guid>
      <dc:creator>philipplant</dc:creator>
      <dc:date>2010-01-20T19:34:13Z</dc:date>
    </item>
  </channel>
</rss>

