03-25-2008 01:12 PM - edited 02-21-2020 03:38 PM
I have an ASA5505. For some reason, I can;t get remote access VPN to work! I keep getting an error with reason 412 on my Cisco VPN client. Everything *seems* to be right, but then again, I'm using the ASDM to work on this and it wasn't exactly helpful with the access-lists. Can someone take a look and tell me if this config looks right to you? Right now, I'm just trying to get a connection to establish. THEN I'll worry about split-tunneling and access to resources, etc. I already have a pair of site-to-site VPN tunnels running and working perfectly. It's the remote access that's gving me headaches. Thanks.
03-25-2008 01:39 PM
Okay, I realized a few stupid things I was doing in the client side. Please ignore a lot of this. However, I've now progressed to the point where it's saying "Negotiating security policies..." and then bombs out with "Reason 433: (Reason Not Specified by Peer)"
03-26-2008 12:50 PM
Command line all the way!
access-list nonat extended permit ip 10.0.2.0 255.255.255.0 10.0.3.0 255.255.255.0
access-list splittunnel extended permit ip 10.0.2.0 255.255.255.0 10.0.3.0 255.255.255.0
local pool Remote_Users 10.3.0.1-10.3.0.254
nat (inside) 0 access-list nonat
group-policy Remote_Users internal
group-policy Remote_Users attributes
dns-server value 10.0.2.252 66.151.0.25
wins-server 10.0.2.252
vpn-idle-timeout 20
split-tunnel-policy tunnelspecified
split-tunnel-network-list value splittunnel
username admin password usKBR9pR4f8aT7eY encrypted privilege 15
crypto ipsec transform-set Remote_Users esp-3des esp-md5-hmac
crypto dynamic-map dyn1 1 set transform-set Remote_Users
crypto map mymap 2 ipsec-isakmp dynamic dyn1
crypto map mymap interface outside
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto isakmp nat-traversal 20
tunnel-group Remote_Users type ipsec-ra
tunnel-group Remote_Users general-attributes
address-pool Remote_Users
default-group-policy Remote_Users
tunnel-group Remote_Users ipsec-attributes
pre-shared-key *
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide