<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISAKMP connection request from client denied by ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892258#M973898</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me take a crack at this for ya.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First thing I do not see is a DHCP Pool to assign clients addreses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! The user vpn dhcp pool cannot overlap with internally used subnets.&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool VPN-DHCP-POOL 192.168.168.1-192.168.168.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! Assigning the VPN DHCP Pool subnet as a no-nat on the outside interface allows the user&lt;/P&gt;&lt;P&gt;! traffic to enter the outside interface from the VPN Client in order to be NAT's on its way to the Inet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (OUTSIDE) 1 192.168.168.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next thing I do not see is a group policy and associated access list that defines user attributes and access, see this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy REMOTEVPN internal&lt;/P&gt;&lt;P&gt;group-policy REMOTEVPN attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.15.112&lt;/P&gt;&lt;P&gt; dns-server value 192.168.15.112&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-filter value VPN-USERACCESS&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; default-domain value mydoamin.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may also want to have usernames for authentication&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 07 Oct 2007 17:50:27 GMT</pubDate>
    <dc:creator>whisperwind</dc:creator>
    <dc:date>2007-10-07T17:50:27Z</dc:date>
    <item>
      <title>ISAKMP connection request from client denied by ASA</title>
      <link>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892255#M973895</link>
      <description>&lt;P&gt;Hi, all, I am running 8.0(2), I am trying to set up IPsec RA on ASA. The IPsec tunnel  from Client will terminate on ASA's Outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It did not work, debug shows that ISAKMP connection request (UDP destination port 500) is either denied by ASA or ASA complains the no translation group found. I don't understand why ASA is denying ISAKMP connection when such connection is by default permitted. (I also tried to configure ACL on Outside interface to explicitly permit udp isakmp, and toggled "crypto map &amp;lt;&amp;gt; interface Outside", "crytp isakmp enable Outside"),  And in what scenario ASA would treat isakmp connection request like a normal inbound traffic and tries to look for translation entry?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be a simple configuration, I followed every step in documentation, I am scratching my head to get it the first step of IPsec VPN RA working...&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892255#M973895</guid>
      <dc:creator>oldcreek12</dc:creator>
      <dc:date>2019-03-11T11:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISAKMP connection request from client denied by ASA</title>
      <link>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892256#M973896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My first guess is that something in the ASA configuration for the RA VPN is not set up correctly and the ASA is attempting to forward the packet to somewhere else. Can you post the config of the ASA (most especially the VPN parts of the config)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2007 15:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892256#M973896</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2007-10-07T15:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISAKMP connection request from client denied by ASA</title>
      <link>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892257#M973897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Rick, thank you for your reply, here is the relevant configuration, please let me know if you need any other configurations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map:&lt;/P&gt;&lt;P&gt;============&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map Outside_dynamic_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dynamic_map&lt;/P&gt;&lt;P&gt;crypto map Outside_map interface Outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable Outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tunnel group configuration:&lt;/P&gt;&lt;P&gt;===========================&lt;/P&gt;&lt;P&gt;tunnel-group ipsec-remote type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ipsec-remote general-attributes&lt;/P&gt;&lt;P&gt; address-pool ra_pool&lt;/P&gt;&lt;P&gt; authentication-server-group RADIUS_SVRS&lt;/P&gt;&lt;P&gt; authorization-server-group RADIUS_SVRS&lt;/P&gt;&lt;P&gt; accounting-server-group RADIUS_SVRS&lt;/P&gt;&lt;P&gt;tunnel-group ipsec-remote ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT related configuration&lt;/P&gt;&lt;P&gt;=========================&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list inside-nonat&lt;/P&gt;&lt;P&gt;access-list inside-nonat extended permit ip INTERNAL-NETS 255.255.255.0 VPN-Client-NET 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2007 16:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892257#M973897</guid>
      <dc:creator>oldcreek12</dc:creator>
      <dc:date>2007-10-07T16:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISAKMP connection request from client denied by ASA</title>
      <link>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892258#M973898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me take a crack at this for ya.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First thing I do not see is a DHCP Pool to assign clients addreses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! The user vpn dhcp pool cannot overlap with internally used subnets.&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool VPN-DHCP-POOL 192.168.168.1-192.168.168.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! Assigning the VPN DHCP Pool subnet as a no-nat on the outside interface allows the user&lt;/P&gt;&lt;P&gt;! traffic to enter the outside interface from the VPN Client in order to be NAT's on its way to the Inet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (OUTSIDE) 1 192.168.168.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next thing I do not see is a group policy and associated access list that defines user attributes and access, see this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy REMOTEVPN internal&lt;/P&gt;&lt;P&gt;group-policy REMOTEVPN attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.15.112&lt;/P&gt;&lt;P&gt; dns-server value 192.168.15.112&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-filter value VPN-USERACCESS&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; default-domain value mydoamin.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may also want to have usernames for authentication&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2007 17:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892258#M973898</guid>
      <dc:creator>whisperwind</dc:creator>
      <dc:date>2007-10-07T17:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISAKMP connection request from client denied by ASA</title>
      <link>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892259#M973899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply, I do have VPN pool "ra-pool" defined  and group policy is DfltGrpPolicy which I modified to include all tunnel protocols. Usernames and authentication is configured in RADIUS server. I doubt the points you made would lead ASA to deny incoming ISAKMP connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry I did not post every line of my configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2007 19:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892259#M973899</guid>
      <dc:creator>oldcreek12</dc:creator>
      <dc:date>2007-10-07T19:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISAKMP connection request from client denied by ASA</title>
      <link>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892260#M973900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well you can either post the entire config here for the community to review or call TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2007 20:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/isakmp-connection-request-from-client-denied-by-asa/m-p/892260#M973900</guid>
      <dc:creator>whisperwind</dc:creator>
      <dc:date>2007-10-07T20:24:36Z</dc:date>
    </item>
  </channel>
</rss>

