12-29-2012 10:12 AM
Dear Folks,
Cisco ASA5510,ver 8.2(2)16, ASDM 6.2, currently Site-to-Site, L2TPoverIPSEC RAVPN and Anyconnect VPN are configured and working successfully.
Recently Configured Cisco VPN Client IPSEC RAVPN, connecting Successfully, but resources cannot reachbility.
When I checked cisco VPN client statistics, I noticed Tunneling Protocol : Inactive
Some one can push me in right direction....
Configuration and test result attached.
Much Appreciated.
Thanks & regards,
01-01-2013 02:37 PM
that is not an issue. it simply shows that you are not using transport mode.
check the router tab and try to ping some destination from the subnets specified there.
and also the given config is not complete for the RAVPN. there will be tunel group and group policy also. are you using split-acl.
and you can try to check using packet tracer command if access is allowed for particular source and destination, when the client is connected.
01-01-2013 08:48 PM
Good Day,
Thanks mate,
Full configuration is pasted below for your view....
checked & verified packet tracer and other network tools , like ping and tracerroute, all seems to be fine.
Any thought..
Thanks & Much Appreciated.
crypto ipsec transform-set aes128sha esp-aes esp-sha-hmac
crypto ipsec transform-set aes128sha mode transport
crypto ipsec transform-set aes256sha esp-aes-256 esp-sha-hmac
crypto ipsec transform-set aes256sha mode transport
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-sha-hmac
crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map out_dyn_map 10 set transform-set aes128sha aes256sha ESP-3DES-SHA TRANS_ESP_3DES_MD5
crypto dynamic-map out_dyn_map 20 set pfs
crypto dynamic-map out_dyn_map 20 set transform-set ESP-3DES-SHA
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto isakmp policy 65535
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
no crypto isakmp nat-traversal
tunnel-group MDT_TABLET_RAVPN type remote-access
tunnel-group MDT_TABLET_RAVPN general-attributes
address-pool MDT_TABLET_RAVPN
authentication-server-group MDT_RAVPN LOCAL
default-group-policy MDT_TABLET_RAVPN
tunnel-group MDT_TABLET_RAVPN ipsec-attributes
pre-shared-key *****
group-policy MDT_TABLET_RAVPN internal
group-policy MDT_TABLET_RAVPN attributes
dns-server value 10.1.x.x 10.1.x.x
vpn-tunnel-protocol IPSec
default-domain value mysecurevpn.com
01-03-2013 10:07 PM
Dear zakir
check my bold word. your phase 1&2 authentication dnt match.
check access list also for NAT and VPN
crypto ipsec transform-set aes128sha esp-aes esp-sha-hmac
crypto ipsec transform-set aes128sha mode transport
crypto ipsec transform-set aes256sha esp-aes-256 esp-sha-hmac
crypto ipsec transform-set aes256sha mode transport
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-sha-hmac
crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide