<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Client not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222903#M876983</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not believe that you are getting as far as Active Directory for authentication. The messages suggest that there is a mismatch between what is configured in your VPN client and what is configured on the ASA:&lt;/P&gt;&lt;P&gt;Hash verification failed... may be configured with invalid group password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would be a key configured on your client along with the group name of abc. The ASA shows that a pre shared key is configured for group authentication:&lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;but it does not show what that key value is. You need to be sure that the values are the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are other people with VPN client able to connect? If so this would suggest a problem in configuration of your client and you need to re-configure your client. If you are the first person and are testing then it is possible to test this by changing the value on the ASA, changing the value on your client, or by changing both (which is the approach I would suggest).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Feb 2009 21:07:56 GMT</pubDate>
    <dc:creator>Richard Burts</dc:creator>
    <dc:date>2009-02-02T21:07:56Z</dc:date>
    <item>
      <title>VPN Client not working</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222902#M876977</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have already configured our firewall to allow VPN client connections. It is also setup to authenticate to our Active Directory but I still get this error on my vpn client software when trying to access my office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 02:26:53.171 02/03/09 Sev=Warning/3 IKE/0xE3000057&lt;/P&gt;&lt;P&gt;The received HASH payload cannot be verified&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 02:26:53.171 02/03/09 Sev=Warning/2 IKE/0xE300007E&lt;/P&gt;&lt;P&gt;Hash verification failed... may be configured with invalid group password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3 02:26:53.171 02/03/09 Sev=Warning/2 IKE/0xE300009B&lt;/P&gt;&lt;P&gt;Failed to authenticate peer (Navigator:904)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4 02:26:53.171 02/03/09 Sev=Warning/2 IKE/0xE30000A7&lt;/P&gt;&lt;P&gt;Unexpected SW error occurred while processing Aggressive Mode negotiator:(Navigator:2238)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my current running config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 123.123.123.12 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name abc.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 123.123.123.18 eq 222&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 123.244.188.18 eq pptp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ST standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ST standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.1.0 255.255.255.0 192.168.100.0 255&lt;/P&gt;&lt;P&gt;.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool abcpool 192.168.100.1-192.168.100.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-615.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 123.123.123.22 222 192.168.1.70 ssh netmask 255.255.2&lt;/P&gt;&lt;P&gt;55.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface pptp 192.168.1.6 pptp netmask 255.255.255.&lt;/P&gt;&lt;P&gt;255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 123.123.123.17 1&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS (inside) host 192.168.1.6&lt;/P&gt;&lt;P&gt;key abc&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no sysopt connection permit-vpn&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set toabc esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set toRMT&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds&lt;/P&gt;&lt;P&gt;28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobyte&lt;/P&gt;&lt;P&gt;s 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map oustide_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 averag&lt;/P&gt;&lt;P&gt;e-rate 200&lt;/P&gt;&lt;P&gt;group-policy abc internal&lt;/P&gt;&lt;P&gt;group-policy abc attributes&lt;/P&gt;&lt;P&gt;dns-server value 192.168.1.6&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value ST&lt;/P&gt;&lt;P&gt;default-domain value abc.local&lt;/P&gt;&lt;P&gt;tunnel-group abc type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group abc general-attributes&lt;/P&gt;&lt;P&gt;address-pool abcpool&lt;/P&gt;&lt;P&gt;authentication-server-group RADIUS&lt;/P&gt;&lt;P&gt;default-group-policy abc&lt;/P&gt;&lt;P&gt;tunnel-group abc ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;abcasa(config)#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222902#M876977</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2019-03-11T14:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client not working</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222903#M876983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not believe that you are getting as far as Active Directory for authentication. The messages suggest that there is a mismatch between what is configured in your VPN client and what is configured on the ASA:&lt;/P&gt;&lt;P&gt;Hash verification failed... may be configured with invalid group password. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would be a key configured on your client along with the group name of abc. The ASA shows that a pre shared key is configured for group authentication:&lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;but it does not show what that key value is. You need to be sure that the values are the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are other people with VPN client able to connect? If so this would suggest a problem in configuration of your client and you need to re-configure your client. If you are the first person and are testing then it is possible to test this by changing the value on the ASA, changing the value on your client, or by changing both (which is the approach I would suggest).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Feb 2009 21:07:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222903#M876983</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2009-02-02T21:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client not working</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222904#M876985</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have already made sure that that pre shared key configured for group authentication is correct. This is the first user to connect to the VPN so I assume that there is an issue going on...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Feb 2009 22:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222904#M876985</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2009-02-02T22:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client not working</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222905#M876987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does the group name configured in the client match the abc used in the config (and does it match upper/lower case)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest changing the shared key to something very simple (you can go to a more complex key when you have it working). change it on both the client and the ASA and see if the behavior changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that does not help then I suggest setting the logging level in the client to high (at least for IKE and perhaps for others such as connection manager. test again and post the log output. perhaps it will have some better clue about the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 22:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-not-working/m-p/1222905#M876987</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2009-02-03T22:45:29Z</dc:date>
    </item>
  </channel>
</rss>

