Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

PIX 501 and Cisco VPN client cannot connect

Status
Not open for further replies.

nloecke

Technical User
May 25, 2005
24
0
0
US
This is the first time I have attempted to set up a Remote Access VPN. I have done the Site-to-Site many times, and didn't think they would be very different. Boy was I wrong.
Anyhow, the Client starts getting connected but gets the infamous "Connection terminated locally by the Client. Reason 412: The remote peer is no longer responding."
I have done a lot of searching and found the same error, but all manner of recommended fixes. I have the log from the VPN client, and I will also post the PIX config.
Thanks everyone who looks at this.

Log:
Cisco Systems VPN Client Version 4.8.01.0300
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
61 09:50:59.015 10/26/06 Sev=Info/4 CM/0x63100002
Begin connection process
62 09:50:59.031 10/26/06 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
63 09:50:59.031 10/26/06 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
64 09:50:59.031 10/26/06 Sev=Info/4 CM/0x63100024
Attempt connection with server "x.x.x.x"
65 09:50:59.046 10/26/06 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with x.x.x.x
66 09:50:59.062 10/26/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to x.x.x.x
67 09:50:59.187 10/26/06 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
68 09:50:59.187 10/26/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
69 09:50:59.203 10/26/06 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 216.203.103.3
70 09:50:59.203 10/26/06 Sev=Warning/2 IKE/0xE300009B
Invalid SPI size (PayloadNotify:116)
71 09:50:59.203 10/26/06 Sev=Info/4 IKE/0xE30000A6
Invalid payload: Stated payload length, 568, is not sufficient for Notification:(PayloadList:149)
72 09:50:59.203 10/26/06 Sev=Warning/3 IKE/0xA3000058
Received malformed message or negotiation no longer active (message id: 0x00000000)
73 09:51:04.172 10/26/06 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
74 09:51:04.172 10/26/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to x.x.x.x
75 09:51:09.172 10/26/06 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
76 09:51:09.172 10/26/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to x.x.x.x
77 09:51:14.173 10/26/06 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
78 09:51:14.173 10/26/06 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to x.x.x.x
79 09:51:19.173 10/26/06 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=65F0BA2A3A963486 R_Cookie=B21AC803A713CE56) reason = DEL_REASON_PEER_NOT_RESPONDING
80 09:51:19.689 10/26/06 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=65F0BA2A3A963486 R_Cookie=B21AC803A713CE56) reason = DEL_REASON_PEER_NOT_RESPONDING
81 09:51:19.689 10/26/06 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "x.x.x.x" because of "DEL_REASON_PEER_NOT_RESPONDING"
82 09:51:19.689 10/26/06 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
83 09:51:19.736 10/26/06 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
84 09:51:19.736 10/26/06 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
85 09:51:19.736 10/26/06 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
86 09:51:19.751 10/26/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
87 09:51:19.751 10/26/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
88 09:51:19.751 10/26/06 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
89 09:51:19.751 10/26/06 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped

PIX Config
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password XJtoz03AGlKUvuQT encrypted
passwd XJtoz03AGlKUvuQT encrypted
hostname pixfirewall
domain-name domain.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list 90 permit ip 10.0.0.0 255.255.255.0 10.1.1.0 255.255.255.248
pager lines 23
mtu outside 1500
mtu inside 1500
ip address outside x.x.x.x 255.255.255.248
ip address inside 10.0.0.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpnpool 10.1.1.1-10.1.1.7
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
route outside 0.0.0.0 0.0.0.0 216.203.103.1 1
route inside 192.168.0.0 255.255.255.0 10.0.0.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set esp-sha esp-null esp-sha-hmac
crypto dynamic-map dynmap 50 set transform-set esp-sha
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap client configuration address initiate
crypto map mymap interface outside
isakmp enable outside
isakmp policy 7 authentication pre-share
isakmp policy 7 encryption 3des
isakmp policy 7 hash md5
isakmp policy 7 group 1
isakmp policy 7 lifetime 86400
vpngroup support address-pool vpnpool
vpngroup support split-tunnel 90
vpngroup support idle-time 1800
vpngroup support max-time 86400
vpngroup support password ********
telnet 10.0.0.0 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 60
console timeout 0
dhcpd address 10.0.0.2-10.0.0.51 inside
dhcpd dns x.x.x.x x.x.x.x
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd enable inside
terminal width 80
Cryptochecksum:12345
: end

<<Witty Signature>>
 
omg..
...there is so much that can go wrong with Reason 412
...just google it..

...i have seen everything from bad ports (had to shut and no shut)
..needed to upgrade vpn client software.(sounds like a good suggestion.the quickest)
.something about transmitting packets intself was a problem (getting a lot of retrans)...this guy pinged across the tunnel and saw a lot of dropped packets so this guy deleted the crypto maps and rebuilt them..then it worked...

...good luck...looks like no magic pill,, you will have to google and test each scenario..
...please keep us informed with results...

CCNP,CCSP,MCSE,Sec+,Net+,A+...
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top