02-22-2006 06:09 PM
I have a problem of disconnection in the VPN Client, the VPN Client send a pop up indicate message 433 and some times 412, the connection without encrypted traffic it ok in all moments included to the VPN concentrator (ASA5520), in the AAA server the account is blank and the group is same.
add the configuration of the ASA5520 and attach debug an logs file
crypto ipsec transform-set myset esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 86400
crypto ipsec security-association lifetime kilobytes 4608000
crypto ipsec fragmentation before-encryption management
crypto ipsec fragmentation before-encryption Inside
crypto ipsec fragmentation before-encryption Outside
crypto ipsec df-bit copy-df management
crypto ipsec df-bit copy-df Inside
crypto ipsec df-bit copy-df Outside
crypto dynamic-map dynmap 19 set transform-set myset
crypto dynamic-map dynmap 19 set security-association lifetime seconds 86400
crypto dynamic-map dynmap 19 set security-association lifetime kilobytes 4608000
crypto map mymap 40 ipsec-isakmp dynamic dynmap
crypto map mymap interface Outside
isakmp identity hostname
isakmp enable Outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
group-policy Intermedio attributes
banner value ACCESO RESRTINGIDO, SOLO PERSONAL AUTORIZADO
banner value
banner value ACCESSOS MONITOREADOS
dns-server value x.x.x.x
vpn-idle-timeout 120
vpn-tunnel-protocol IPSec
password-storage disable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Split-Inter
split-dns value aeromexpress.com.mx
webvpn
no functions
no html-content-filter
no homepage
no filter
no url-list
no port-forward
no port-forward-name
tunnel-group MXIntermedio type ipsec-ra
tunnel-group MXIntermedio general-attributes
address-pool MXINTER
authentication-server-group ACS LOCAL
no authorization-server-group
accounting-server-group ACS
default-group-policy Intermedio
no dhcp-server
no strip-realm
no strip-group
tunnel-group MXIntermedio ipsec-attributes
pre-shared-key *
no authorization-required
authorization-dn-attributes CN OU
peer-id-validate req
no radius-with-expiry
no chain
no trust-point
isakmp keepalive threshold 20 retry 2
02-28-2006 02:07 PM
Go to Start > Programs > Cisco Systems VPN Client > Set MTU.
Set the MTU to 1400 bytes (or lower). Check that you can use NetBIOS names. This is also used to check for dropped packets.
Go to Start > Run. Type ipconfig /all to verify that the VPN Client receives the correct WINS and DNS information from the VPN Concentrator. Check the even log for the VPN Client.
Verify that the PC that runs the VPN Client gets registered with the WINS and or DNS server through Dynamic Host Configuration Protocol (DHCP) correctly.
Verify that there are no filtering devices between the VPN Client and the resources you try to access. Ensure that the needed ports for Microsoft networking are allowed to pass
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide