<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN client issue  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179302#M877801</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As requested i am sending the my config &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 7.0(1)&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; description WAN_connectivity&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xx.2.3 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; description Lan-connectivity&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.193.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; description WEB_NATACCESS&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 10.108.1.3 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip 10.0.0.0 255.0.0.0 10.108.1.252 255.255.255.2&lt;/P&gt;&lt;P&gt;52&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool RemoteVPNpool 10.108.1.253-10.108.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xxx.2.8 192.168.193.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.2.1 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 10.108.1.1 1&lt;/P&gt;&lt;P&gt;route DMZ 10.108.1.23 255.255.255.255 10.108.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;group-policy vpn3000 internal&lt;/P&gt;&lt;P&gt;group-policy vpn3000 attributes&lt;/P&gt;&lt;P&gt; user-authentication enable&lt;/P&gt;&lt;P&gt;username admin password eY/fQXw7Ure8Qrz7 encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TCVPN-OLY esp-3des esp-none&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set test-vpn esp-3des esp-none&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RVPN esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map mymap 10 set transform-set RVPN&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 11 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 11 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 11 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 11 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 11 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.0.0.0 DMZ&lt;/P&gt;&lt;P&gt;telnet 192.168.151.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.193.5-192.168.193.200 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 212.115.32.3 80.253.148.33&lt;/P&gt;&lt;P&gt;dhcpd lease 3000&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 general-attributes&lt;/P&gt;&lt;P&gt; address-pool RemoteVPNpool&lt;/P&gt;&lt;P&gt; default-group-policy vpn3000&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vinu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Jan 2009 09:44:51 GMT</pubDate>
    <dc:creator>vinoth.kumar</dc:creator>
    <dc:date>2009-01-13T09:44:51Z</dc:date>
    <item>
      <title>VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179298#M877796</link>
      <description>&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using PIX 7.0 and i have created a IPSEC Vpn and trying to connect the same from my VPN client 4.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The group authentication is working fine but after for the user authorization is asking for username and password &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since we are not using any TACCAS or RADIUS is it possible to give user authorization as PIX local usrname and password&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vinoth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179298#M877796</guid>
      <dc:creator>vinoth.kumar</dc:creator>
      <dc:date>2019-03-11T14:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179299#M877798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes it is possible - create a local username and password in the PIX, then in the VPN tunnel group add:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication-server-group local.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Jan 2009 12:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179299#M877798</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-01-12T12:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179300#M877799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try to issue the command on my firewall but i dont have that command listed &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(config)# vpngroup vpn3000 authe&lt;/P&gt;&lt;P&gt;(config)# vpngroup vpn3000 authentication-server ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;  WORD  The name of the IUA AAA server on the firewall headend&lt;/P&gt;&lt;P&gt;(config)# vpngroup vpn3000 authentication-server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please guide me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2009 07:25:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179300#M877799</guid>
      <dc:creator>vinoth.kumar</dc:creator>
      <dc:date>2009-01-13T07:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179301#M877800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure you are running code ver 7.x - as the config you posted looks to be in the wrong format for ver 7.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post the entire remote VPN config please.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2009 09:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179301#M877800</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-01-13T09:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179302#M877801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As requested i am sending the my config &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 7.0(1)&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; description WAN_connectivity&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xx.2.3 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; description Lan-connectivity&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.193.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; description WEB_NATACCESS&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 10.108.1.3 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip 10.0.0.0 255.0.0.0 10.108.1.252 255.255.255.2&lt;/P&gt;&lt;P&gt;52&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool RemoteVPNpool 10.108.1.253-10.108.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xxx.2.8 192.168.193.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.2.1 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 10.108.1.1 1&lt;/P&gt;&lt;P&gt;route DMZ 10.108.1.23 255.255.255.255 10.108.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;group-policy vpn3000 internal&lt;/P&gt;&lt;P&gt;group-policy vpn3000 attributes&lt;/P&gt;&lt;P&gt; user-authentication enable&lt;/P&gt;&lt;P&gt;username admin password eY/fQXw7Ure8Qrz7 encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TCVPN-OLY esp-3des esp-none&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set test-vpn esp-3des esp-none&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RVPN esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map mymap 10 set transform-set RVPN&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 11 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 11 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 11 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 11 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 11 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.0.0.0 DMZ&lt;/P&gt;&lt;P&gt;telnet 192.168.151.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.193.5-192.168.193.200 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 212.115.32.3 80.253.148.33&lt;/P&gt;&lt;P&gt;dhcpd lease 3000&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 general-attributes&lt;/P&gt;&lt;P&gt; address-pool RemoteVPNpool&lt;/P&gt;&lt;P&gt; default-group-policy vpn3000&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vinu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2009 09:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179302#M877801</guid>
      <dc:creator>vinoth.kumar</dc:creator>
      <dc:date>2009-01-13T09:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179303#M877802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add the below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group vpn3000 ipsec-attributes &lt;/P&gt;&lt;P&gt;authentication-server-group LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2009 09:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179303#M877802</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-01-13T09:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179304#M877803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply i entred the command after that i &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug crypto isakmp its shows some error &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCNEW-FW# Jan 13 04:41:02 [IKEv1]: QM IsRekeyed old sa not found by addr&lt;/P&gt;&lt;P&gt;Jan 13 04:41:02 [IKEv1]: QM FSM error (P2 struct &amp;amp;0x20c59a0, mess id 0x2dea489f)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Jan 13 04:41:02 [IKEv1]: Group = vpn3000, Username = admin, IP = xx.xx.37.82,&lt;/P&gt;&lt;P&gt;Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2009 12:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179304#M877803</guid>
      <dc:creator>vinoth.kumar</dc:creator>
      <dc:date>2009-01-13T12:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179305#M877804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - that is a completly different error for a differnet reason.  Checking more of your VPN config, you are missing the below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map remote_vpn 10 set transform-set RVPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map mymap 65535 ipsec-isakmp dynamic remote_vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add the above and test again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jan 2009 12:25:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179305#M877804</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-01-13T12:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179306#M877806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now the iam able to login tthrough the VPN Client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a small question is it possible to recover  VPN pre-share keys in PIX 6.3 (3) since we planned to put new firewall instead of existing one &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jan 2009 11:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179306#M877806</guid>
      <dc:creator>vinoth.kumar</dc:creator>
      <dc:date>2009-01-15T11:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client issue</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179307#M877808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Copy the config from the pix to a tftp server:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;write net &amp;lt;&lt;TFTP server="" ip=""&gt;&amp;gt;:&amp;lt;&lt;CONFIG file="" name=""&gt;&amp;gt;.txt&lt;/CONFIG&gt;&lt;/TFTP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jan 2009 12:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-issue/m-p/1179307#M877808</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-01-15T12:07:27Z</dc:date>
    </item>
  </channel>
</rss>

