Hello All,
I have really been going over the pix info on the cisco site, but I am at a loss with trying to get the cisco vpn client 4.0.3, or the Cosine communications SafeNet client v 9 to connect via IPSEC.
The cisco client returns this error message
403 Unable to contact security gatewy
the cisco messgae log has
Cisco Systems VPN Client Version 4.0.3 (C)
Copyright (C) 1998-2003 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600
1 15:56:23.271 04/18/05 Sev=Warning/3 IKE/0xA3000029
No keys are available to decrypt the received ISAKMP payload
The Safenet client returns this message in the log
4-18: 16:21:46.124
4-18: 16:21:46.124 My Connections\AJINC - Initiating IKE Phase 1 (IP ADDR=199.199.199.99)
4-18: 16:21:46.124 My Connections\AJINC - SENDING>>>> ISAKMP OAK MM (SA, VID 2x)
4-18: 16:21:51.502 My Connections\AJINC - message not received! Retransmitting!
4-18: 16:21:51.502 My Connections\AJINC - SENDING>>>> ISAKMP OAK MM (Retransmission)
4-18: 16:21:56.510 My Connections\AJINC - message not received! Retransmitting!
4-18: 16:21:56.510 My Connections\AJINC - SENDING>>>> ISAKMP OAK MM (Retransmission)
4-18: 16:22:01.518 My Connections\AJINC - Exceeded 2 IKE SA negotiation attempts
The safenet website says the most common cause of this error is that packets are not routing back to the client from the pix
Below is my pix cfg I would grately appreciate it if some one could take a look to see if I have some routing / access list problem.
My LAN is 193.168.2.0
My VPN is 10.10.10.0
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
names
access-list inside_outbound_nat0_acl permit ip 193.168.2.0 255.255.255.0 10.10.10.0 255.255.255.0
access-list OUTSIDE_IN permit icmp any any
access-list OUTSIDE_IN permit ip any any
access-list outside_cryptomap_dyn_10 permit ip 193.168.2.0 255.255.255.0 10.10.10.0 255.255.255.0
pager lines 24
logging on
icmp permit any outside
mtu outside 1500
mtu inside 1500
ip address outside pppoe
ip address inside 193.168.2.1 255.255.255.0
ip verify reverse-path interface outside
ip verify reverse-path interface inside
ip audit info action alarm
ip audit attack action alarm
ip local pool kgcpa 10.10.10.1-10.10.10.10
pdm location 10.10.10.0 255.255.255.0 outside
pdm location 193.168.2.0 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group OUTSIDE_IN in interface outside
route outside 0.0.0.0 0.0.0.0 193.168.2.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 193.168.2.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 10 match address outside_cryptomap_dyn_10
crypto dynamic-map outside_dyn_map 10 set pfs group2
crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 10 set security-association lifetime seconds 86400 kilobytes 4608000
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup kgcpaipsec address-pool kgcpa
vpngroup kgcpaipsec dns-server 193.168.2.2 151.196.0.38
vpngroup kgcpaipsec default-domain ajinc.local
vpngroup kgcpaipsec split-tunnel outside_cryptomap_dyn_10
vpngroup kgcpaipsec pfs
vpngroup kgcpaipsec idle-time 1800
vpngroup kgcpaipsec max-time 86400
vpngroup kgcpaipsec password ********
telnet timeout 5
ssh timeout 5
management-access inside
console timeout 0
vpdn group pppoe_group request dialout pppoe
vpdn group pppoe_group localname vze2q563
vpdn group pppoe_group ppp authentication pap
vpdn username admin password *********
dhcpd address 193.168.2.10-193.168.2.41 inside
dhcpd dns 193.168.2.2 151.196.0.38
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain ajinc.local
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
I have really been going over the pix info on the cisco site, but I am at a loss with trying to get the cisco vpn client 4.0.3, or the Cosine communications SafeNet client v 9 to connect via IPSEC.
The cisco client returns this error message
403 Unable to contact security gatewy
the cisco messgae log has
Cisco Systems VPN Client Version 4.0.3 (C)
Copyright (C) 1998-2003 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600
1 15:56:23.271 04/18/05 Sev=Warning/3 IKE/0xA3000029
No keys are available to decrypt the received ISAKMP payload
The Safenet client returns this message in the log
4-18: 16:21:46.124
4-18: 16:21:46.124 My Connections\AJINC - Initiating IKE Phase 1 (IP ADDR=199.199.199.99)
4-18: 16:21:46.124 My Connections\AJINC - SENDING>>>> ISAKMP OAK MM (SA, VID 2x)
4-18: 16:21:51.502 My Connections\AJINC - message not received! Retransmitting!
4-18: 16:21:51.502 My Connections\AJINC - SENDING>>>> ISAKMP OAK MM (Retransmission)
4-18: 16:21:56.510 My Connections\AJINC - message not received! Retransmitting!
4-18: 16:21:56.510 My Connections\AJINC - SENDING>>>> ISAKMP OAK MM (Retransmission)
4-18: 16:22:01.518 My Connections\AJINC - Exceeded 2 IKE SA negotiation attempts
The safenet website says the most common cause of this error is that packets are not routing back to the client from the pix
Below is my pix cfg I would grately appreciate it if some one could take a look to see if I have some routing / access list problem.
My LAN is 193.168.2.0
My VPN is 10.10.10.0
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
names
access-list inside_outbound_nat0_acl permit ip 193.168.2.0 255.255.255.0 10.10.10.0 255.255.255.0
access-list OUTSIDE_IN permit icmp any any
access-list OUTSIDE_IN permit ip any any
access-list outside_cryptomap_dyn_10 permit ip 193.168.2.0 255.255.255.0 10.10.10.0 255.255.255.0
pager lines 24
logging on
icmp permit any outside
mtu outside 1500
mtu inside 1500
ip address outside pppoe
ip address inside 193.168.2.1 255.255.255.0
ip verify reverse-path interface outside
ip verify reverse-path interface inside
ip audit info action alarm
ip audit attack action alarm
ip local pool kgcpa 10.10.10.1-10.10.10.10
pdm location 10.10.10.0 255.255.255.0 outside
pdm location 193.168.2.0 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group OUTSIDE_IN in interface outside
route outside 0.0.0.0 0.0.0.0 193.168.2.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 193.168.2.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 10 match address outside_cryptomap_dyn_10
crypto dynamic-map outside_dyn_map 10 set pfs group2
crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 10 set security-association lifetime seconds 86400 kilobytes 4608000
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup kgcpaipsec address-pool kgcpa
vpngroup kgcpaipsec dns-server 193.168.2.2 151.196.0.38
vpngroup kgcpaipsec default-domain ajinc.local
vpngroup kgcpaipsec split-tunnel outside_cryptomap_dyn_10
vpngroup kgcpaipsec pfs
vpngroup kgcpaipsec idle-time 1800
vpngroup kgcpaipsec max-time 86400
vpngroup kgcpaipsec password ********
telnet timeout 5
ssh timeout 5
management-access inside
console timeout 0
vpdn group pppoe_group request dialout pppoe
vpdn group pppoe_group localname vze2q563
vpdn group pppoe_group ppp authentication pap
vpdn username admin password *********
dhcpd address 193.168.2.10-193.168.2.41 inside
dhcpd dns 193.168.2.2 151.196.0.38
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain ajinc.local
dhcpd auto_config outside
dhcpd enable inside
terminal width 80