cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
715
Views
5
Helpful
1
Replies

Problems to establish a vpn site to site between ASA5505 and RV180W

Hello,

I'm asking for your help about a problem I have been struggling with for about a two day.

Background information:
- ASA5505 (ASDM5.2)
- Router RV180W
- VPN Site To Site

Probleme :
I tried to configure the VPN again but i always get the same errors . I tested many solution found on internet but it doesn't work.
Did someone experienced this kind of problem? I'm running out of ideas!!!
Thanks in davance for your help

 

Configuration VPN on RV180W

(File attachment)

Logging ASA


7|Sep 02 2015|09:24:14|715077|||Pitcher: received a key acquire message, spi 0x0
7|Sep 02 2015|09:24:13|713236|||IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 68
4|Sep 02 2015|09:24:13|713903|||IP = ***.***.***.**4, Header invalid, missing SA payload! (next payload = 4)
6|Sep 02 2015|09:24:13|302016|81.255.34.117|SRV_ERP|Teardown UDP connection 7023 for outside:81.255.34.117/8137 to inside:SRV_ERP/20957 duration 0:02:01 bytes 252
7|Sep 02 2015|09:24:12|713236|||IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 68
4|Sep 02 2015|09:24:12|713903|||IP = ***.***.***.**4, Header invalid, missing SA payload! (next payload = 4)
7|Sep 02 2015|09:24:12|713236|||IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 68
4|Sep 02 2015|09:24:12|713903|||IP = ***.***.***.**4, Header invalid, missing SA payload! (next payload = 4)
4|Sep 02 2015|09:24:08|713903|||Group = ***.***.***.**4, IP = ***.***.***.**4, Error: Unable to remove PeerTblEntry
3|Sep 02 2015|09:24:08|713902|||Group = ***.***.***.**4, IP = ***.***.***.**4, Removing peer from peer table failed, no match!
7|Sep 02 2015|09:24:08|713906|||Group = ***.***.***.**4, IP = ***.***.***.**4, sending delete/delete with reason message
7|Sep 02 2015|09:24:08|713906|||Group = ***.***.***.**4, IP = ***.***.***.**4, IKE SA MM:7145c26f terminating:  flags 0x01000022, refcnt 0, tuncnt 0
7|Sep 02 2015|09:24:08|715065|||Group = ***.***.***.**4, IP = ***.***.***.**4, IKE MM Initiator FSM error history (struct &0x41da7a0)  <state>, <event>:  MM_DONE, EV_ERROR-->MM_BLD_MSG5, EV_GROUP_LOOKUP-->MM_BLD_MSG5, EV_TEST_CERT-->MM_BLD_MSG5, EV_SECRET_KEY_OK-->MM_BLD_MSG5, NullEvent-->MM_BLD_MSG5, EV_GEN_SECRET_KEY-->MM_WAIT_MSG4, EV_PROCESS_MSG-->MM_WAIT_MSG4, EV_RCV_MSG
4|Sep 02 2015|09:24:08|713903|||Group = ***.***.***.**4, IP = ***.***.***.**4, Can't find a valid tunnel group, aborting...!
7|Sep 02 2015|09:24:08|713906|||IP = ***.***.***.**4, computing NAT Discovery hash
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing NAT-Discovery payload
7|Sep 02 2015|09:24:08|713906|||IP = ***.***.***.**4, computing NAT Discovery hash
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing NAT-Discovery payload
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing VID payload
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing nonce payload
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing ISA_KE payload
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing ke payload
7|Sep 02 2015|09:24:08|713236|||IP = ***.***.***.**4, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 248
7|Sep 02 2015|09:24:08|713236|||IP = ***.***.***.**4, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304
7|Sep 02 2015|09:24:08|713906|||IP = ***.***.***.**4, computing NAT Discovery hash
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing NAT-Discovery payload
7|Sep 02 2015|09:24:08|713906|||IP = ***.***.***.**4, computing NAT Discovery hash
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing NAT-Discovery payload
7|Sep 02 2015|09:24:08|715048|||IP = ***.***.***.**4, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing VID payload
7|Sep 02 2015|09:24:08|715038|||IP = ***.***.***.**4, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
7|Sep 02 2015|09:24:08|715048|||IP = ***.***.***.**4, Send IOS VID
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing xauth V6 VID payload
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing Cisco Unity VID payload
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing nonce payload
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing ke payload
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing VID payload
7|Sep 02 2015|09:24:08|715049|||IP = ***.***.***.**4, Received DPD VID
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing VID payload
7|Sep 02 2015|09:24:08|715049|||IP = ***.***.***.**4, Received NAT-Traversal ver 02 VID
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing VID payload
7|Sep 02 2015|09:24:08|713906|||IP = ***.***.***.**4, Oakley proposal is acceptable
7|Sep 02 2015|09:24:08|715047|||IP = ***.***.***.**4, processing SA payload
7|Sep 02 2015|09:24:08|713236|||IP = ***.***.***.**4, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 144
7|Sep 02 2015|09:24:08|713236|||IP = ***.***.***.**4, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 188
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing Fragmentation VID + extended capabilities payload
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing NAT-Traversal VID ver 03 payload
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing NAT-Traversal VID ver 02 payload
7|Sep 02 2015|09:24:08|715046|||IP = ***.***.***.**4, constructing ISAKMP SA payload
5|Sep 02 2015|09:24:08|713041|||IP = ***.***.***.**4, IKE Initiator: New Phase 1, Intf inside, IKE Peer ***.***.***.**4  local Proxy Address 192.168.0.0, remote Proxy Address 192.168.1.0,  Crypto map (outside_map)
7|Sep 02 2015|09:24:08|715077|||Pitcher: received a key acquire message, spi 0x0
7|Sep 02 2015|09:24:06|713236|||IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + NOTIFY (11) + NONE (0) total length : 68
4|Sep 02 2015|09:24:06|713903|||IP = ***.***.***.**4, Header invalid, missing SA payload! (next payload = 4)

Configuration ASA :

hostname *******
domain-name ******
enable password ********* encrypted
passwd ********* encrypted
names
name ***.***.***.*** LAN_CA
name ***.***.***.*** LAN_EY
name ***.***.***.*** SR
name ***.***.***.*** LAN_N
name ***.***.***.*** WAN
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.0.100 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 pppoe client vpdn group ****
 ip address pppoe 
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
no ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns server-group DefaultDNS
 domain-name ....
access-list AS_splitTunnelAcl standard permit any 
access-list inside_nat0_outbound extended permit ip any LAN_CA 255.255.255.0 
access-list inside_nat0_outbound extended permit ip LAN_CA 255.255.255.0 any 
access-list inside_nat0_outbound extended permit ip LAN_N 255.255.255.0 any 
access-list inside_nat0_outbound extended permit ip any LAN_N 255.255.255.0 
access-list inside_nat0_outbound extended permit ip LAN_EY 255.255.255.0 LAN_CA 255.255.255.0 
access-list outside_1_cryptomap extended permit ip LAN_EY 255.255.255.0 LAN_CA 255.255.255.0 
access-list outside_2_cryptomap extended permit ip LAN_EY 255.255.255.0 LAN_CA 255.255.255.0 
access-list N_splitTunnelAcl standard permit LAN_EY 255.255.255.0 
access-list outside_1_cryptomap_1 extended permit ip LAN_EY 255.255.255.0 LAN_CA 255.255.255.0 
pager lines 24
logging enable
logging list VPN level critical class vpn
logging asdm debugging
logging class vpn asdm emergencies 
mtu inside 1500
mtu outside 1472
ip local pool VPN_N 192.168.4.2-192.168.4.10 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 LAN_EYSINES 255.255.255.0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 ***.***.***.*** 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
aaa authentication ssh console LOCAL 
aaa authentication telnet console LOCAL 
http server enable
http ***.***.***.*** 255.255.255.255 outside
http LAN_EY 255.255.255.0 inside
http LAN_CA 255.255.255.0 inside
http ***.***.***.*** 255.255.255.255 outside
http ***.***.***.*** 255.255.255.255 outside
http ***.***.***.*** 255.255.255.255 outside
http LAN_N 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
sysopt connection tcpmss 0
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto dynamic-map outside_dyn_map 20 set pfs group1
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto map outside_map 1 match address outside_1_cryptomap_1
crypto map outside_map 1 set pfs group1
crypto map outside_map 1 set peer ***.***.***.*** 
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable inside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto isakmp policy 30
 authentication pre-share
 encryption aes
 hash sha
 group 2
 lifetime 86400
crypto isakmp nat-traversal  20
crypto isakmp ipsec-over-tcp port 10000 
telnet timeout 5
ssh ***.***.***.*** 255.255.255.255 outside
ssh timeout 5
ssh version 2
console timeout 0
vpdn group **** request dialout pppoe
vpdn group **** localname ***/*****
vpdn group **** ppp authentication pap
vpdn username ***/***** password ********* 
dhcpd dns ***.***.***.*** ***.***.***.***
dhcpd auto_config outside
!
dhcpd address 192.168.0.240-192.168.0.250 inside
dhcpd dns 192.168.0.110 80.10.246.136 interface inside
!

group-policy Nomades internal
group-policy Nomades attributes
 vpn-tunnel-protocol IPSec 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value N_splitTunnelAcl
group-policy VPN_EXT internal
group-policy VPN_EXT attributes
 vpn-tunnel-protocol IPSec 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value AS_splitTunnelAcl
username ****** password ******* encrypted privilege 0
username eraymond attributes
 vpn-group-policy Nomades
username ******** password *********. encrypted privilege 15
username ******* attributes
 vpn-group-policy Nomades
username ******* password ******* encrypted privilege 0
username ******** attributes
 vpn-group-policy Nomades
tunnel-group VPN_EXT type ipsec-ra
tunnel-group VPN_EXT general-attributes
 address-pool VPN_NOMADES
 default-group-policy VPN_EXT
tunnel-group VPN_EXT ipsec-attributes
 pre-shared-key *
tunnel-group VPN_CAS type ipsec-l2l
tunnel-group VPN_CAS ipsec-attributes
 pre-shared-key *
tunnel-group Nomades type ipsec-ra
tunnel-group Nomades general-attributes
 address-pool VPN_NOMADES
 default-group-policy Nomades
tunnel-group Nomades ipsec-attributes
 pre-shared-key *
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny 
  inspect sunrpc 
  inspect xdmcp 
  inspect sip 
  inspect netbios 
  inspect tftp 
  inspect icmp 
!
service-policy global_policy global
prompt hostname context 

 

 

1 Reply 1

Richard Burts
Hall of Fame
Hall of Fame

You have obscured so much of the information in the ASA config that it is impossible to determine if it is correct or not. And the amount of obscured information in the log output makes it difficult to interpret. One thing that does stand out in the log output is this message

4|Sep 02 2015|09:24:08|713903|||Group = ***.***.***.**4, IP = ***.***.***.**4, Can't find a valid tunnel group, aborting...!

which suggests that your tunnel group configuration is not correct.

 

HTH

 

Rick

 

HTH

Rick