cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6477
Views
0
Helpful
15
Replies

Unable to establish remote access VPN connection from behind ASA

KUNAL HANS
Level 1
Level 1

Hi,

We have two sites, Site-A with a ASA 5520 (Remote Access IPSEC VPN server) at one end and a new ASA 5515-X at Site-B. Users at Site-B are unable to establish a VPN connection to Site-A via Cisco VPN client from behind the new ASA 5515-X. They see the following error:

"Secure VPN Connection terminated locally by the client.

Reason 412: The remote peer is no longer responding.

They are able to access the same from home or elsewhere so I believe there is nothing wrong with Site-A ASA vpn config which we have been using for a while now. The new 5515-X (version 8.6) has a very basic config  with all outbound traffic allowed. I'm pasting the config below. Do I need to enable/allow anything for it to work?

CISCOASA# sh run
: Saved
:
ASA Version 8.4(3)
!
hostname CISCOASA
enable password xxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxx encrypted
names
!
interface Ethernet0/0
nameif outside
security-level 0
ip address x.x.x.x 255.255.255.248
!
interface Ethernet0/1
nameif backup
security-level 0
ip address 172.16.16.11 255.255.255.0
!
interface Ethernet0/2
shutdown
 no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
shutdown
nameif management
security-level 100
no ip address
management-only
!
ftp mode passive
dns server-group abc
object network obj-172.16.16.0
subnet 172.16.16.0 255.255.255.0
object network obj-172.16.17.0
subnet 172.16.17.0 255.255.255.0
object network obj-172.16.18.0
subnet 172.16.18.0 255.255.255.0
object network obj-172.16.19.0
subnet 172.16.19.0 255.255.255.0
access-list 101 extended permit icmp any any
pager lines 24
logging asdm informational
mtu management 1500
mtu outside 1500
mtu backup 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
!
object network obj-172.16.16.0
nat (inside,outside) dynamic interface
object network obj-172.16.17.0
nat (inside,outside) dynamic interface
object network obj-172.16.18.0
nat (inside,outside) dynamic interface
object network obj-172.16.19.0
nat (inside,outside) dynamic interface
access-group 101 in interface outside
route outside 0.0.0.0 0.0.0.0 x.x.x.x 1
route inside 172.16.17.0 255.255.255.0 172.16.16.1 1
route inside 172.16.18.0 255.255.255.0 172.16.16.1 1
route inside 172.16.19.0 255.255.255.0 172.16.16.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
http 0.0.0.0 0.0.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
!
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username test password xxxxxxxxxxxx encrypted
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home reporting anonymous prompt 2
Cryptochecksum:fb76bae794475f06d31c2c7ba32ca49a
: end
15 Replies 15

Thank you Karthikeyan.  unfortunately it doesn't work out. I have  3 Policy maps, here:

------------------

!

class-map vpn-udp-class

match access-list vpn-udp-acl

class-map inspection_default

match default-inspection-traffic

!

!

policy-map vpn-udp-policy

class vpn-udp-class

  inspect ipsec-pass-thru

policy-map type inspect dns migrated_dns_map_1

parameters

  message-length maximum 768

policy-map global_policy

class inspection_default

  inspect dns migrated_dns_map_1

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect http

  inspect netbios

  inspect rsh

  inspect rtsp

  inspect skinny 

  inspect sqlnet

  inspect sunrpc

  inspect tftp

  inspect sip 

  inspect xdmcp

  inspect pptp

  inspect ipsec-pass-thru

!

service-policy global_policy global

service-policy vpn-udp-policy interface outside

********** I still could not use fixup protocol with ip-sec-pass-thru**** here:

pix535# conf t

pix535(config)# fixup protocol ipsec-pass-thru

                                ^

ERROR: % Invalid input detected at '^' marker.

pix535(config)# fixup protocol ?

configure mode commands/options:

  ctiqbe     

  dns        

  ftp        

  h323       

  http       

  icmp       

  ils        

  mgcp       

  mmp        

  netbios    

  pptp       

  rsh        

  rtsp       

  sip        

  skinny     

  smtp       

  snmp       

  sqlnet     

  sunrpc     

  sunrpc_udp 

  tftp       

  waas       

  xdmcp      

******* I know this is a touchy issue and it has been bothering me for long time****

****manually pickup port instead of  auto ports not helping

Thank you very much for spending your valuable time helping us out

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: