Hi,
I am trying to set up remote access VPNs and am having trouble. I used:
When I connect from the Cisco VPN client I am getting an error: "Secure VPN Connection terminated locally by client. Reason 412: The remote peer is no longer responding."
My network looks like this.
Router-----ASA----LAN
I can see the traffic getting through my router when I attempt to connect. The IP connecting to is my outside interface's IP on the ASA and is a public IP. It is also the IP that is nat'ed to my mail server. Does this cause a problem? (I hope not because I am out of IP's and I don't want to have to buy more).
Please find the relevant part of my ASA config below. thanks for your help.
Result of the command: "sh running"
: Saved : ASA Version 7.0(5) ! hostname domain-name enable password names dns-guard ! interface Ethernet0/0 nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 ! interface Ethernet0/1 nameif outside security-level 0 ip address PUBLIC IP ! interface Ethernet0/2 shutdown no nameif no security-level no ip address ! interface Management0/0 shutdown nameif management security-level 100 ip address management-only ! passwd SisLvDjB/rijelPS encrypted banner exec # You are logging into a corporate device. Unauthorized access is prohibited. banner motd # "We are what we repeatedly do. Excellence, then, is not an act, but a habit." - Aristotle # ftp mode passive clock timezone EST -5 clock summer-time EDT recurring dns domain-lookup inside dns name-server object-group service NecessaryServices tcp port-object eq echo port-object eq www port-object eq domain port-object eq smtp port-object eq ftp-data port-object eq pop3 port-object eq aol port-object eq ftp port-object eq https object-group service UDPServices udp port-object eq nameserver port-object eq www port-object eq isakmp port-object eq domain object-group service TCP-UDPServices tcp-udp port-object eq echo port-object eq www port-object eq domain
pager lines 24 logging enable logging timestamp logging list ASALog level notifications logging monitor notifications logging trap notifications logging asdm informational logging device-id hostname logging host inside mtu management 1500 mtu inside 1500 mtu outside 1500 ip local pool vpnclient 192.168.10.1-192.168.10.254 ip verify reverse-path interface inside ip verify reverse-path interface outside asdm image disk0:/asdm505.bin asdm history enable arp timeout 14400 nat-control global (outside) 2 PUBLIC IP PAT netmask 255.255.255.255 nat (inside) 0 access-list 110 nat (inside) 2 PRIVATE IPS static (inside,outside) PUBLIC IP (outside interface) mailserver netmask 255.255.255.255 access-group inside_access_in in interface inside access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 ROUTER INSIDE IP ! timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server vpn protocol radius aaa-server vpn PRIVATE IP OF IAS SERVER key **** group-policy vpnUsers internal group-policy vpnUsers attributes banner value You are remotely accessing a corporate network. Any unauthorized use is strictly prohibited. dns-server value PRIVATE IP OF DNS SERVER webvpn username LOCAL USER ACCOUNT IN CASE IAS IS DOWN http server enable no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set RemoteVPNSet esp-aes-256 esp-sha-hmac crypto dynamic-map RemoteVPNDynmap 10 set transform-set RemoteVPNSet crypto dynamic-map RemoteVPNDynmap 10 set reverse-route crypto map RemoteVPNMap 10 ipsec-isakmp dynamic RemoteVPNDynmap crypto map RemoteVPNMap interface outside isakmp enable outside isakmp policy 10 authentication pre-share isakmp policy 10 encryption aes-256 isakmp policy 10 hash sha isakmp policy 10 group 2 isakmp policy 10 lifetime 2000 tunnel-group DefaultRAGroup general-attributes authentication-server-group (outside) vpn tunnel-group RemoteVPN type ipsec-ra tunnel-group RemoteVPN general-attributes address-pool vpnclient authentication-server-group vpn tunnel-group RemoteVPN ipsec-attributes pre-shared-key * console timeout 0 dhcpd lease 3600 dhcpd ping_timeout 50 ! class-map global-policy match default-inspection-traffic class-map inspection_default match default-inspection-traffic ! ! policy-map global_policy class inspection_default inspect ftp inspect http policy-map global-policy class global-policy inspect http inspect icmp inspect ftp inspect dns inspect esmtp ! service-policy global_policy global smtp-server PRIVATE IP MAIL SERVER Cryptochecksum:e4042ef4dbb31b13906ab838782ba7db : end
Thanks again for any light you can shed on this.