Hey all,
got some problems with a VPN Connection from an iPhone with my asa.
After getting the following error message (debug crypto isakmp 126):
Apr 04 10:36:15 [IKEv1 DEBUG]: Group = IPSEC-Certificate, IP = 109.84.0.28, constructing dpd vid payload
Apr 04 10:36:15 [IKEv1]: IP = 109.84.0.28, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + CERT (6) + SIG (9) + VENDOR (13) + NONE (0) total length : 1318
Apr 04 10:36:15 [IKEv1]: Group = IPSEC-Certificate, IP = 109.84.0.28, Received encrypted Oakley Informational packet with invalid payloads, MessID = 2773911525
Apr 04 10:36:16 [IKEv1 DEBUG]: Group = IPSEC-Certificate, IP = 109.84.0.28, constructing blank hash payload
Apr 04 10:36:16 [IKEv1 DEBUG]: Group = IPSEC-Certificate, IP = 109.84.0.28, constructing qm hash payload
Apr 04 10:36:16 [IKEv1]: IP = 109.84.0.28, IKE_DECODE SENDING Message (msgid=95ebaa63) with payloads : HDR + HASH (8) + ATTR (14) + NONE (0) total length : 72
the tunnel won't come up.
I followed some instructions creating the certificate:
E=iphone@company.com
CN=ciscoasa (hostname of my asa)
OU=iOs
O=company
L=location
S=
C=DE
Anybody else have a clue for this?
Thanks in advance.
Best regards,
Chris