01-24-2011 02:48 AM - edited 02-21-2020 05:07 PM
Hi,
I have configured a VPN that I'm attempting to setup. However, what is happening is that any client that connects to the VPN disconnects after a short period of time. Here is the the log that the Cisco VPN client generates. I 've attempted VPN time outs isakmp NAT traversal and isakmp keepalives and can not figure out what is happening.
Cisco Systems VPN Client Version 5.0.07.0290
Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.1.7600
Config file directory: C:\Program Files (x86)\Cisco Systems\VPN Client\
1 16:20:23.358 01/21/11 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CheckUpVASettings: Found IPADDR entry addr=192.168.25.190, error 0
2 16:20:24.367 01/21/11 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CleanUpVASettings: Was able to delete all VA settings after all, error 0
3 16:20:24.990 01/21/11 Sev=Warning/2 IKE/0xA3000067
Received an IPC message during invalid state (IKE_MAIN:512)
4 16:53:11.288 01/21/11 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CheckUpVASettings: Found IPADDR entry addr=192.168.25.192, error 0
5 16:53:12.291 01/21/11 Sev=Warning/2 CVPND/0xA3400015
Error with call to IpHlpApi.DLL: CleanUpVASettings: Was able to delete all VA settings after all, error 0
Here is my Cisco ASA configuration:
: Saved
:
ASA Version 8.2(3)3
!
hostname ***
domain-name ***
enable password 49j00eCjj encrypted
passwd NJfXtvcV encrypted
names
dns-guard
!
interface Ethernet0/0
nameif outside
security-level 0
ip address x.x.x.x 255.255.255.248
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.x.x 255.255.255.0
!
interface Ethernet0/2
nameif t1
security-level 0
ip address 65.44.x.x 255.255.255.248
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
!
boot system disk0:/asa823-3-k8.bin
ftp mode passive
dns domain-lookup outside
dns domain-lookup inside
dns server-group DefaultDNS
name-server x.x.x.x
name-server x.x.x.x
domain-name ******
dns server-group GoogleDNS
name-server 8.8.8.8
name-server 8.8.4.4
access-list inside_nat0_outbound extended permit ip any 192.168.25.128 255.255.255.128
access-list inside_nat0_outbound extended permit ip 192.168.25.0 255.255.255.0 192.168.25.128 255.255.255.12
access-list outside_access_in extended permit icmp any any
access-list test1_splitTunnelAcl standard permit 192.168.25.0 255.255.255.0
access-list INBOUND extended permit tcp any interface outside eq ssh
access-list t1_access_in extended permit tcp any interface t1 eq ssh
access-list torrent extended permit tcp any host x.x.x.x eq 51413
access-list torrent extended permit udp any host x.x.x.x eq 51413
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu t1 1500
mtu management 1500
ip local pool testtestVPN 192.168.25.150-192.168.25.199 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any t1
asdm image disk0:/asdm-625-53.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
global (t1) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface ssh 192.168.25.11 ssh netmask 255.255.255.255
static (inside,t1) tcp interface ssh 192.168.25.11 ssh netmask 255.255.255.255
access-group INBOUND in interface outside
access-group t1_access_in in interface t1
route outside 0.0.0.0 0.0.0.0 24.x.x.x 1 track 1
route t1 0.0.0.0 0.0.0.0 65.x.x.x 254
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
http 192.168.25.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
sla monitor 123
type echo protocol ipIcmpEcho 24.x.x.x interface outside
sla monitor schedule 123 life forever start-time now
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES5
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto map t1_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map t1_map interface t1
crypto isakmp enable outside
crypto isakmp enable t1
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
!
track 1 rtr 123 reachability
telnet 192.168.25.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.25.0 255.255.255.0 inside
ssh timeout 5
console timeout 10
dhcpd address 192.168.25.100-192.168.25.149 inside
dhcpd dns 8.8.8.8 8.8.4.4 interface inside
dhcpd enable inside
!
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
group-policy test internal
group-policy test attributes
dns-server value x.x.x.x x.x.x.x
vpn-idle-timeout none
vpn-session-timeout none
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value test1_splitTunnelAcl
group-policy test_t1 internal
group-policy test_t1 attributes
dns-server value x.x.x.x x.x.x.x
vpn-tunnel-protocol IPSec
username test1 password 2fomu81iLrRLiQui encrypted privilege 0
username test1 attributes
vpn-group-policy test
username testAcc2 password DB.oqF6Xv7LQVHFz encrypted
username testAcc3 password pjgDRS0eZt0h4lPx encrypted
tunnel-group test type remote-access
tunnel-group test general-attributes
address-pool testVPN
default-group-policy test
tunnel-group test ipsec-attributes
pre-shared-key *****
isakmp keepalive threshold 300 retry 5
tunnel-group test_t1 type remote-access
tunnel-group test_t1 general-attributes
address-pool testVPN
default-group-policy test_t1
tunnel-group test_t1 ipsec-attributes
pre-shared-key *****
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns migrated_dns_map_1
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns migrated_dns_map_1
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
!
service-policy global_policy global
privilege cmd level 3 mode exec command perfmon
privilege cmd level 3 mode exec command ping
privilege cmd level 3 mode exec command who
privilege cmd level 3 mode exec command logging
privilege cmd level 3 mode exec command failover
privilege cmd level 3 mode exec command packet-tracer
privilege show level 5 mode exec command import
privilege show level 5 mode exec command running-config
privilege show level 3 mode exec command reload
privilege show level 3 mode exec command mode
privilege show level 3 mode exec command firewall
privilege show level 3 mode exec command asp
privilege show level 3 mode exec command cpu
privilege show level 3 mode exec command interface
privilege show level 3 mode exec command clock
privilege show level 3 mode exec command dns-hosts
privilege show level 3 mode exec command access-list
privilege show level 3 mode exec command logging
privilege show level 3 mode exec command vlan
privilege show level 3 mode exec command ip
privilege show level 3 mode exec command ipv6
privilege show level 3 mode exec command failover
privilege show level 3 mode exec command asdm
privilege show level 3 mode exec command arp
privilege show level 3 mode exec command route
privilege show level 3 mode exec command ospf
privilege show level 3 mode exec command aaa-server
privilege show level 3 mode exec command aaa
privilege show level 3 mode exec command eigrp
privilege show level 3 mode exec command crypto
privilege show level 3 mode exec command vpn-sessiondb
privilege show level 3 mode exec command ssh
privilege show level 3 mode exec command dhcpd
privilege show level 3 mode exec command vpn
privilege show level 3 mode exec command blocks
privilege show level 3 mode exec command wccp
privilege show level 3 mode exec command dynamic-filter
privilege show level 3 mode exec command webvpn
privilege show level 3 mode exec command module
privilege show level 3 mode exec command uauth
privilege show level 3 mode exec command compression
privilege show level 3 mode configure command interface
privilege show level 3 mode configure command clock
privilege show level 3 mode configure command access-list
privilege show level 3 mode configure command logging
privilege show level 3 mode configure command ip
privilege show level 3 mode configure command failover
privilege show level 5 mode configure command asdm
privilege show level 3 mode configure command arp
privilege show level 3 mode configure command route
privilege show level 3 mode configure command aaa-server
privilege show level 3 mode configure command aaa
privilege show level 3 mode configure command crypto
privilege show level 3 mode configure command ssh
privilege show level 3 mode configure command dhcpd
privilege show level 5 mode configure command privilege
privilege clear level 3 mode exec command dns-hosts
privilege clear level 3 mode exec command logging
privilege clear level 3 mode exec command arp
privilege clear level 3 mode exec command aaa-server
privilege clear level 3 mode exec command crypto
privilege clear level 3 mode exec command dynamic-filter
privilege cmd level 3 mode configure command failover
privilege clear level 3 mode configure command logging
privilege clear level 3 mode configure command arp
privilege clear level 3 mode configure command crypto
privilege clear level 3 mode configure command aaa-server
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:8321a517f14aed6b02412bdb17f62ab3
: end
01-24-2011 06:21 AM
Hi,
One thing that you can check is to leave a constant PING to the outside IP of the ASA from the VPN client and check if the VPN drops because IP connectivity to the ASA fails at that point.
If for whatever reason, the communication between the client and the ASA stops, the VPN will drop.
Federico.
01-27-2011 08:22 AM
So after some testing\debugging I found that when the VPN connection drop I get the following errors in the ASA:
192.168.25.43 is a static IP computer on the inside interface.
192.168.25.161 is the VPN client
2 | Jan 27 2011 | 02:47:50 | 106001 | 192.168.25.43 | 22 | 192.168.25.161 | 52139 | Inbound TCP connection denied from 192.168.25.43/22 to 192.168.25.161/52139 flags PSH ACK on interface inside |
2 | Jan 27 2011 | 02:47:40 | 106001 | 192.168.25.43 | 22 | 192.168.25.161 | 52139 | Inbound TCP connection denied from 192.168.25.43/22 to 192.168.25.161/52139 flags PSH ACK on interface inside |
I can't figure out how to allow this TCP connection as an ACL list?
Can you please help?
I've also found that the connection did indeed drop because I had a back up route to the internet configured and that was causing the VPN over the outside interface to drop. But I still have the issue where the Inbound TCP connection denied from 192.168.25.43/22 to 192.168.25.161/52139 flags PSH ACK on interface inside. How do I allow this? I tried setting a bi directional ACL for the VPN tunnel group but that doesn't seem to work... I'm at a complete loss
01-24-2011 06:25 AM
What Windows version exactly are your clients running?
What error message does the ASA generate when the client disconnects?
01-27-2011 02:14 AM
So after some testing\debugging I found that when the VPN connection drop I get the following errors in the ASA:
192.168.25.43 is a static IP computer on the inside interface.
192.168.25.161 is the VPN client
2 | Jan 27 2011 | 02:47:50 | 106001 | 192.168.25.43 | 22 | 192.168.25.161 | 52139 | Inbound TCP connection denied from 192.168.25.43/22 to 192.168.25.161/52139 flags PSH ACK on interface inside |
2 | Jan 27 2011 | 02:47:40 | 106001 | 192.168.25.43 | 22 | 192.168.25.161 | 52139 | Inbound TCP connection denied from 192.168.25.43/22 to 192.168.25.161/52139 flags PSH ACK on interface inside |
I can't figure out how to allow this TCP connection as an ACL list?
Can you please help?
01-27-2011 08:27 AM
The TCP_flags are as follows:
-ACK-The acknowledgment number was received.
-FIN-Data was sent.
-PSH-The receiver passed data to the application.
-RST-The connection was reset.
-SYN-Sequence numbers were synchronized to start a connection.
-URG-The urgent pointer was declared valid.
In your case I think one recommendation is to use a non-overlapping VPN pool.
Can you test another range tha won't overlapp with the internal network?
Federico.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide