Vpn cannot coonect: vpn type = Cisco IPsec

Howdy,
I cannot connect to my vpn server at work receiving this error message "The VPN server did not respond. Verify the server address and try reconnecting."
I have verified, using the packet sniffer wireshark, that the first isakmp packet goes out to my work server and a correctly formatted isakmp reply (with a single selected proposal/transform SA payload) returns in reply. Then my racoon retransmits as if it never heard the reply.
I tried turning off the osx appliacation firewall, but get the same result... a correct isakmp reply does return from the server, but my racoon seems to never hear it and it just retransmits message-1.
What are the possible cluprits that could throw out my isakmp reply packet before racoon hears it?
The /var/log/system.log file holds these relevant entries:
Aug 19 09:44:28 narwal racoon[467]: Connecting.
Aug 19 09:44:28 narwal racoon[467]: IKE Packet: transmit success. (Initiator, Aggressive-Mode message 1).
Aug 19 09:44:38 narwal configd[15]: SCNCController: Disconnecting. (Connection tried to negotiate for, 0 seconds).
Aug 19 09:44:38 narwal racoon[467]: Disconnecting. (Connection tried to negotiate for, 9.966375 seconds).
I also manually configured and started racoon turning up the debug level very high and find no new info that way. racoon simply does not get the reply packet that I can see in wireshark.
Any help appreciated.

Additional info:
While attempting to connect, I run a `netstat` command and see that even the OS seems to not hear the reply from the server:
udp4 0 0 localhost.ipsec-msft .
udp4 0 0 localhost.isakmp .
udp4 0 0 192.168.2.105.ipsec-ms .
udp4 0 0 192.168.2.105.isakmp .
Sooooo... reiterating the question:
What potential culprits on the packet path might be throwing out this reply packet even before the OS udp layer? I think I have eliminated the snow-leapord application firewall as the culprit by turning it off and getting the same result.
And just to prove that wireshark really is seeing the return packet, I am posting the (trimmed) tshark -V output here too:
narwal:~ rcharletOld$ tshark -V
Capturing on en1
Frame 1 (747 bytes on wire, 747 bytes captured)
<snip>
Internet Protocol, Src: 192.168.2.105 (192.168.2.105), Dst: 72.5.229.5 (72.5.229.5)
<snip>
User Datagram Protocol, Src Port: isakmp (500), Dst Port: isakmp (500)
Source port: isakmp (500)
Destination port: isakmp (500)
Length: 713
Checksum: 0xdd63 [correct]
[Good Checksum: True]
[Bad Checksum: False]
Internet Security Association and Key Management Protocol
Initiator cookie: E1C811BDD9DF8F6D
Responder cookie: 0000000000000000
Next payload: Security Association (1)
Version: 1.0
Exchange type: Aggressive (4)
<snip>
Security Association payload
Next payload: Key Exchange (4)
Payload length: 292
Domain of interpretation: IPSEC (1)
Situation: IDENTITY (1)
Proposal payload # 1
<snip>
Transform payload # 1
Next payload: Transform (3)
Payload length: 36
Transform number: 1
Transform ID: KEY_IKE (1)
Life-Type (11): Seconds (1)
Life-Duration (12): Duration-Value (3600)
Encryption-Algorithm (1): AES-CBC (7)
Key-Length (14): Key-Length (256)
Authentication-Method (3): XAUTHInitPreShared (65001)
Hash-Algorithm (2): SHA (2)
Group-Description (4): Alternate 1024-bit MODP group (2)
<snip>
Transform payload # 8
Next payload: NONE (0)
Payload length: 32
Transform number: 8
Transform ID: KEY_IKE (1)
Life-Type (11): Seconds (1)
Life-Duration (12): Duration-Value (3600)
Encryption-Algorithm (1): DES-CBC (1)
Authentication-Method (3): XAUTHInitPreShared (65001)
Hash-Algorithm (2): MD5 (1)
Group-Description (4): Alternate 1024-bit MODP group (2)
<snip>
Frame 2 (450 bytes on wire, 450 bytes captured)
<snip>
Internet Protocol, Src: 72.5.229.5 (72.5.229.5), Dst: 192.168.2.105 (192.168.2.105)
<snip>
Header checksum: 0x753d [correct]
<snip>
User Datagram Protocol, Src Port: isakmp (500), Dst Port: isakmp (500)
<snip>
Checksum: 0x535a [correct]
<snip>
Internet Security Association and Key Management Protocol
Initiator cookie: E1C811BDD9DF8F6D
Responder cookie: AF5EABF6C58CB367
Next payload: Security Association (1)
Version: 1.0
Exchange type: Aggressive (4)
Flags: 0x00
.... ...0 = Not encrypted
.... ..0. = No commit
.... .0.. = No authentication
Message ID: 0x00000000
Length: 408
Security Association payload
Next payload: Key Exchange (4)
Payload length: 56
Domain of interpretation: IPSEC (1)
Situation: IDENTITY (1)
Proposal payload # 1
Next payload: NONE (0)
Payload length: 44
Proposal number: 1
Protocol ID: ISAKMP (1)
SPI Size: 0
Proposal transforms: 1
Transform payload # 3
Next payload: NONE (0)
Payload length: 36
Transform number: 3
Transform ID: KEY_IKE (1)
Encryption-Algorithm (1): AES-CBC (7)
Key-Length (14): Key-Length (256)
Hash-Algorithm (2): MD5 (1)
Group-Description (4): Alternate 1024-bit MODP group (2)
Authentication-Method (3): XAUTHInitPreShared (65001)
Life-Type (11): Seconds (1)
Life-Duration (12): Duration-Value (3600)
Key Exchange payload
<snip>
Nonce payload
<snip>
Identification payload
Next payload: Hash (8)
Payload length: 12
ID type: 1
ID type: IPV4_ADDR (1)
Protocol ID: UDP (17)
Port: Unused
Identification data: 72.5.229.5
<snip>

Similar Messages

  • Cisco IPSec VPN Client and sending a specific Radius A-V value to ACS 5.2

    This setup is to try routing Cisco VPN to either RSA or Entrust from Cisco ACS 5.2, depending on some parameter in incoming AUTH request from Cisco IPSec VPN Client 5.x. Tried playing with pcf files and user names/identity stores, none seems working

    Hi Tony,
    to the best of my knowledge this is currently not possible, but will be once this enhancement is implemented:
    CSCsw31922    Radius upstream VSAs (Tunnel Group,Client type) for VPN policy decisions
    You may want to try and ask in the AAA forum if there is anything you can do on ACS...
    hth
    Herbert

  • Mavericks 10.9.5 VPN Cisco IPSec stopped working. Please help.

    My machine with (what might be) relevant software:
    Macbook Pro mid 2012
    Mavericks 10.9.5
    Server 3.2.1
    Xcode 6.0.1
    I use VPN to connect to Cisco IPSec.
    This used to work fine. Two days ago I noticed it stopped working.
    Over the few days before I installed Server and used some services, but switched them off after using.
    I used the DNS service and automated xcode build, but all switched off.
    When trying to connect to Cisco IPSec VPN I now get some kind of timeout, with the following in my log:
    02/10/2014 09:42:44.768 configd[24]: IPSec connecting to server 64.13.171.130
    02/10/2014 09:42:44.771 configd[24]: network changed.
    02/10/2014 09:42:44.772 configd[24]: IPSec Phase1 starting.
    02/10/2014 09:42:44.773 configd[24]: SCNC: start, triggered by (402) SystemUIServer, type IPSec, status 0, trafficClass 0
    02/10/2014 09:42:45.221 racoon[59453]: accepted connection on vpn control socket.
    02/10/2014 09:42:45.221 racoon[59453]: IPSec connecting to server 64.13.171.130
    02/10/2014 09:42:45.222 racoon[59453]: Connecting.
    02/10/2014 09:42:45.222 racoon[59453]: IPSec Phase 1 started (Initiated by me).
    02/10/2014 09:42:45.226 racoon[59453]: IKE Packet: transmit success. (Initiator, Aggressive-Mode message 1).
    02/10/2014 09:42:45.227 racoon[59453]: >>>>> phase change status = Phase 1 started by us
    02/10/2014 09:42:45.230 configd[24]: network changed.
    02/10/2014 09:42:45.415 racoon[59453]: port 62465 expected, but 0
    02/10/2014 09:42:45.465 racoon[59453]: IKEv1 Phase 1 AUTH: success. (Initiator, Aggressive-Mode Message 2).
    02/10/2014 09:42:45.466 racoon[59453]: >>>>> phase change status = Phase 1 started by peer
    02/10/2014 09:42:45.466 racoon[59453]: IKE Packet: receive success. (Initiator, Aggressive-Mode message 2).
    02/10/2014 09:42:45.466 racoon[59453]: IKEv1 Phase 1 Initiator: success. (Initiator, Aggressive-Mode).
    02/10/2014 09:42:45.466 racoon[59453]: IKE Packet: transmit success. (Initiator, Aggressive-Mode message 3).
    02/10/2014 09:42:45.466 racoon[59453]: IPSec Phase 1 established (Initiated by me).
    02/10/2014 09:42:45.469 configd[24]: network changed.
    02/10/2014 09:42:45.655 racoon[59453]: IPSec Extended Authentication requested.
    02/10/2014 09:42:45.655 configd[24]: IPSec requesting Extended Authentication.
    02/10/2014 09:42:45.661 configd[24]: network changed.
    02/10/2014 09:42:49.984 xpcproxy[59462]: assertion failed: 13F34: xpcproxy + 3438 [D559FC96-E6B1-363A-B850-C7AC9734F210]: 0x2
    02/10/2014 09:43:36.000 kernel[0]: IOHIDSystem: postEvent LLEventQueue overflow.
    02/10/2014 09:44:45.759 racoon[59453]: IKE Packet: receive success. (Information message).
    02/10/2014 09:44:45.759 configd[24]: IPSec Controller: IKE FAILED. phase 4, assert 0
    02/10/2014 09:44:45.760 configd[24]: IPSec disconnecting from server 64.13.171.130
    02/10/2014 09:44:45.761 racoon[59453]: IPSec disconnecting from server 64.13.171.130
    02/10/2014 09:44:45.761 racoon[59453]: failed to send vpn_control message: Broken pipe
    02/10/2014 09:44:45.763 racoon[59453]: IPSec disconnecting from server 64.13.171.130
    02/10/2014 09:44:45.766 configd[24]: network changed.
    02/10/2014 09:44:45.774 configd[24]: network changed.
    Any suggestions on what I could possibly have broken and how to fix it? I need this VPN connection for work.

    A guess, but could this be an issue with changed permissions somehow? Something seems to stop the password popup to show. And then authentication fails.

  • VPN mit Cisco RV180W / IPSec

    hallo liebe Leute,
    ich versuche schon seit einer Woche alles  mögliche und lese herum im net um eine VPN-Verbindung auf IPSec-Basis  hinzubekommen. PPTP war easy, aber das soll ja unsicher sein. IPSec  klappt einfach nicht.
    Ich habe einen Cisco RV180w-Router. Da ich die  Authentifizierung über Zertifikate lösen möchte, habe ich mir schon mal  das RouterZertifikat exportieren lassen und abgespeichert.
    Da ist  schon das erste Problem aufgetaucht - bei der IPSec-Einrichtung werde  ich gezwungen einen sogenannten "Vorinstallierten Schlüssel" zu  vergeben. Wozu? Ich habe ja dann die Zertifikate und mein  strognswan-vpn-client bietet nicht einmal die möglichkeit bei der  Einrichtung einen sogenannten Vorinstallieren Schlüssel eingeben zu  können (siehe screenshot).
    Das zweite Problem ist, ich möchte eine  client to getaway-Verbindung und nicht getaway zu getaway - nun aber  fragt mich Cisco bei der Einrichtung nach der Remote WAN-IP-Adresse (  siehe screenshot mit roten Fragezeichen).
    Was das ganze noch absurder  macht, selbst in der eigenen HIlfe, wird darauf hingewiesen, dass bei  einer client to getaway-Verbindung die IP-Adresse selbst beim  Verbindungsaufbau vergeben wird. Nun aber kann ich das Feld nicht leer  lassen, ich muss eine IP eintragen. Standardwert war FQDN mit  "remote.com" ... aber so kann man es ja nicht lassen nehme ich an.
    Naja  ich ließ mich nicht unterkriegen und nahm einfach die fixe IP des  Verbindungsrechners und als passwort habe ich auch etwas vergeben. Nun  danach habe ich direkt am Cisco-Interface ein Self Certificate Request  durchgeführt und das Ergebnis exportiert.
    mittels "openssl genrsa  -out file.key 1024" habe ich mir einen schlüssel generiert und dann das  Zertifikat mit "openssl x509 -req -days 60 -in test.csr -signkey  file.key -out zert.crt" signiert.
    Das Ergebnis zert.crt habe ich  anschließend hochgeladen. Beim Client (strongswan) habe ich dann das  exportierte Router-Zertifikat angegeben + mein signiertes Zertifikat.  Die Verbindung klappt jedoch nicht.
    Ich bin wirklich für jeden  kleinen Tipp oder Erklärung dankbar - ich habe schon so viel  herumprobiert, dass ich nun einfach Hilfe brauche - denn um ehrlich zu  sein - ich habe keinen Plan wie es klappen soll.
    Ich bedanke mich schon recht herzlich im Voraus für jeden Erklärungsversuch!

    danke - auf das wäre ich nun wirklich nicht gekommen aber im Nachhinein logisch. Es wird immer besser - laut Protokol wird mein user nun auch eingelogt. Danach kommen jedoch zwei Fehler: "invalied encryption algorithm=0" & "does not have mode config" - Ich habe etwas reserchiert und das gefunden:
    https://supportforums.cisco.com/docs/DOC-13711
    laut dem Beitrag dort geht es mit einem iPad oder iPhone nicht, nun ich teste das ganze von Zuhause aus und somit bin ich über WLAN-Hotspot des Handys (HTC/Android) eingelogt. Daran sollte es bei mir jedoch nicht liegen da ja alles bis zu meinem Rechner getunnelt wird.
    QuickVPN hat bei mir übrigens nicht geklappt, erst wo ich bei users Auth-Protokol auf Xauth gestellt habe, hat es funktioniert. Hättest du noch einen Tipp für mich woran es liegen könnte? Danke!
    Lg.
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Remote configuration for identifier "remote.com" found
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received request for new phase 1 negotiation: ...[500]<=>89.144.192.*[24528]
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Beginning Aggressive mode.
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received Vendor ID: CISCO-UNITY
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received Vendor ID: RFC 3947
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received unknown Vendor ID
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received unknown Vendor ID
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received unknown Vendor ID
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received unknown Vendor ID
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received Vendor ID: DPD
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  For 89.144.192.*[24528], Selected NAT-T version: RFC 3947Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  invalied encryption algorithm=0.
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  invalied encryption algorithm=0.
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  invalied encryption algorithm=0.
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  invalied encryption algorithm=0.
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] NOTIFY:  The packet is retransmitted by 89.144.192.*[24528].
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] WARNING:  the packet retransmitted in a short time from 89.144.192.*[24528]
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] NOTIFY:  The packet is retransmitted by 89.144.192.*[24528].
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Floating ports for NAT-T with peer 89.144.192.*[11069]
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] WARNING:  Ignore INITIAL-CONTACT notification from 89.144.192.*[11069] because it is only accepted after phase1.
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received unknown Vendor ID
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received Vendor ID: CISCO-UNITY
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  NAT-D payload does not match for ...[4500]
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  NAT-D payload does not match for 89.144.192.*[11069]
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  NAT detected: Local is behind a NAT device. and alsoPeer is behind a NAT device
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Sending Xauth request to 89.144.192.*[11069]
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  ISAKMP-SA established for ...[4500]-89.144.192.*[11069] with spi:e6011b446960e42a:53fbbbbb976a2eb4
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received attribute type "ISAKMP_CFG_REPLY" from 89.144.192.*[11069]
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Login succeeded for user  "test"
    Wed Mar 13 19:27:29 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  XAuthUser testh Logged In from IP Address 89.144.192.*
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Received attribute type "ISAKMP_CFG_REQUEST" from 89.144.192.*[11069]
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Local configuration for 89.144.192.*[11069] does not have mode config
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] ERROR:  Unknown notify message from 89.144.192.*[11069].No phase2 handle found.
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  Purged ISAKMP-SA with proto_id=ISAKMP and spi=e6011b446960e42a:53fbbbbb976a2eb4.
    Wed Mar 13 19:27:30 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  XAuthUser test Logged Out from IP Address 89.144.192.*
    Wed Mar 13 19:27:31 2013 (GMT +0100): [routerB21ACE] [IKE] INFO:  ISAKMP-SA deleted for ...[4500]-89.144.192.*[11069] with spi:e6011b446960e42a:53fbbbbb976a2eb4

  • Mavericks VPN dropouts with native VPN client and Cisco IPSec

    Since update to Maverics I am experiencing VPN dropouts with native VPN client and Cisco IPSec
    I am connecting via a WIFI router to a remote VPN server
    The conenction is good for a while but eventually it drops out.
    I had Zero issues in mountain lion and only have issues since the update to 10.9
    I had similar issues in teh past with an unrelaibel wifi router but i am using a Verizon Fios router and it has worked impecably until mavericks
    My thoughts are:
    1 -issue with mavericks  ( maybe the app sleep funciton affecting eithe VPN or WIFI daemons)
    2- Issue with  cisco router compaitibility or timing with Cisco IPSEC
    3- Issue with WIFI itself on mavericks - some sort of WIFI software bug
    Any thousuggestions?

    Since update to Maverics I am experiencing VPN dropouts with native VPN client and Cisco IPSec
    I am connecting via a WIFI router to a remote VPN server
    The conenction is good for a while but eventually it drops out.
    I had Zero issues in mountain lion and only have issues since the update to 10.9
    I had similar issues in teh past with an unrelaibel wifi router but i am using a Verizon Fios router and it has worked impecably until mavericks
    My thoughts are:
    1 -issue with mavericks  ( maybe the app sleep funciton affecting eithe VPN or WIFI daemons)
    2- Issue with  cisco router compaitibility or timing with Cisco IPSEC
    3- Issue with WIFI itself on mavericks - some sort of WIFI software bug
    Any thousuggestions?

  • Cisco IPSEC VPN not working after upgrade to Mavericks

    I have been using the Cisco IPSEC VPN for almost 2 years with no issues. When I upgraded to Mavericks this week it stopped working. When i tell it to connect it prompts for password and attempts to connect for about 30 seconds then comes back with the following message...
    VPN Connection
    The negotiation with the VPN server failed. Verify the server address and try reconnecting.
    The address, group, shared secret, user and password are correct. Any help would be greatly appreiated.

    Hry, I'm not sure if this fixes the Cisco IPSec issue, but I can vouch for it fixing the L2TP issue that occurs after tha mavericks upgrade!
    I’ve got L2TP VPN working in Mavericks 10.9 and Server App 3.0.0 / 3.0.1.
    It really is quite a simple fix.
    Obviously, the standard caveats apply: This is a temporary, unsupported, workaround, and only a suggested idea at that. Again, this workaround is NOT supported by Apple.
    Proceed with this workaround on your own equipment at your own risk. And remember the golden rule: Always backup your data!
    OK so here goes… copy and paste the following into termini ONE LINE AT A TIME!
    cd /tmp
    curl -sO http://c5mart.co/mavericks-vpn-fix/racoon.tar.gz
    tar -xzvf racoon.tar.gz
    rm racoon.tar.gz
    sudo chown root:wheel racoon
    sudo chmod 555 racoon
    if [ ! -f /usr/sbin/racoon.mavericks ]; then sudo mv /usr/sbin/racoon /usr/sbin/racoon.mavericks; fi;
    sudo mv racoon /usr/sbin/racoon
    sudo killall racoon
    This works fine for me and I'm running a OSX Server for my entire office.
    …et voilà!

  • Cisco works LMS 3.0.1 cannot archieve configuration for cisco 3000 series vpn concentrator

    Hi All,
    Our problem is, we have Cisco Works LMS 3.0.1. cannot archieve configuration for cisco 3000 series vpn concentrator.
    Any help would be greatly appreciated.
    Thanks in advance.
    Samir

    Make sure you have filled out all of the HTTP/HTTPS credential data in DCR for these devices.  RME will only use HTTPS to fetch VPN concentrator configurations.

  • Profile for Cisco IPsec VPN does not set shared secret correctly

    Hi,
    We have a shared secret configuration for a Cisco IPsec (connecting to an ASA). I can correctly configure a profile for the Cisco IPsec VPN and deliver it to the device. However, the VPN connection fails due to an invalid shared secret. If I then go into the VPN settings on the device itself and manually retype the shared secret, it works fine.
    I have noticed this when generating the mobileconfig profile both from Apple's iPhone Configuration Utility and also when using the MobileIron management platform to generate and push profiles.
    Has anyone else seen this problem? I'm really confident that I'm typing the shared secret correctly in the iPCU generated profile as I've tried it many times. It also has happened across every flavor of iOS 3.x and 4.x (including the 4.2 betas).
    thanks

    Hi,
    Thanks for the reply but it is a bit of a strange one. What makes you think the shared secret we are using - which you don't know - is more than 32 characters long. I can promise you it isn't. There's a bug in the way mobileconfig files are storing the encrypted shared secret values. I've now seen it on a third party mobile device management platform too.

  • Configurate cisco ipsec vpn client at asa 5505 version 8.4

    Hi dear. I want to configurate cisco ipsec vpn client at asa 5505. At my asa the software version is 8.4.
    please provide me a link or some material to config ipsec vpn client at asa 5505 version 8.4
    thank you.

    are you looking for vpn client .pcf file or the configuration on ASA (ASDM) ?
    what version of vpn client ?

  • Double VPN (Cisco IPSEC + PPTP) no longer works in Yosemite

    Hi there.
    I used to use two VPN connections pre-Yosemite, I could establish a Cisco IPSEC VPN using the native VPN in Mavericks, and then establish another VPN through that connection to connect to a PPTP VPN.
    It is not possible anymore, but if instead of using Apple's Cisco VPN implementation I use Cisco's AnyConnect, then sure enough I can use the native PPTP VPN to connect to my lab.
    MacBook Pro --> Corporate VPN (Cisco) --> Lab VPN (PPTPD)
    Whether I use Cisco AnyConnect or native VPN, I can always ping the PPTP server, but can't establish a VPN if using native VPN.
    Anybody noticed something change and maybe has a fix for that?

    The issue was with my tech department after all...

  • Azure Site to Site VPN with Cisco ASA 5505

    I have got Cisco ASA 5505 device (version 9.0(2)). And i cannot connect S2S with azure (azure network alway in "connecting" state). In my cisco log:
    IP = 104.40.182.93, Keep-alives configured on but peer does not support keep-alives (type = None)
    Group = 104.40.182.93, IP = 104.40.182.93, QM FSM error (P2 struct &0xcaaa2a38, mess id 0x1)!
    Group = 104.40.182.93, IP = 104.40.182.93, Removing peer from correlator table failed, no match!
    Group = 104.40.182.93, IP = 104.40.182.93,Overriding Initiator's IPSec rekeying duration from 102400000 to 4608000 Kbs
    Group = 104.40.182.93, IP = 104.40.182.93, PHASE 1 COMPLETED
    I have done all cisco s2s congiguration over standard wizard cos seems your script for 8.x version of asa only?
    (Does azure support 9.x version of asa?)
    How can i fix it?

    Hi,
    As of now, we do not have any scripts for Cisco ASA 9x series.
    Thank you for your interest in Windows Azure. The Dynamic routing is not supported for the Cisco ASA family of devices.
    Unfortunately, a dynamic routing VPN gateway is required for Multi-Site VPN, VNet to VNet, and Point-to-Site.
    However, you should be able to setup a site-to-site VPN with Cisco ASA 5505 series security appliance as
    demonstrated in this blog:
    Step-By-Step: Create a Site-to-Site VPN between your network and Azure
    http://blogs.technet.com/b/canitpro/archive/2013/10/09/step-by-step-create-a-site-to-site-vpn-between-your-network-and-azure.aspx
    You can refer to this article for Cisco ASA templates for Static routing:
    http://msdn.microsoft.com/en-us/library/azure/dn133793.aspx
    Did you download the VPN configuration file from the dashboard and copy the content of the configuration
    file to the Command Line Interface of the Cisco ASDM application? It seems that there is no specified IP address in the access list part and maybe that is why the states message appeared.
    According to the
    Cisco ASA template, it should be similar to this:
    access-list <RP_AccessList>
    extended permit ip object-group
    <RP_OnPremiseNetwork> object-group <RP_AzureNetwork>
    nat (inside,outside) source static <RP_OnPremiseNetwork>
    <RP_OnPremiseNetwork> destination static <RP_AzureNetwork>
    <RP_AzureNetwork>
    Based on my experience, to establish
    IPSEC tunnel, you need to allow the ESP protocol and UDP Port 500. Please make sure that the
    VPN device cannot be located behind a NAT. Besides, since Cisco ASA templates are not
    compatible for dynamic routing, please make sure that you chose the static routing.
    Since you configure the VPN device yourself, it's important that you would be familiar with the device and its configuration settings.
    Hope this helps you.
    Girish Prajwal

  • VPN PROBLEM CISCO ASA 5505

        Hello,  I have been trying to configure a VPN with Cisco Asa 5505 and Cisco VPN client 5.X for 3 weeks and I am not being able to accomplish it, so I decided to reset to factory defaults and start over again.
         I used ASDM 6.4 VPN wizard to configure it (I selected exempt local network from NAT and enabled split tunneling, but I have tried other combinations as well).
         Tunnel seems to be established properly since I do see an endpoint while using 'sh crypto isakmp sa' but 'sh crypto ipsec sa' shows no packets encrypted or decrypted, so VPN is not working as expected. I can't ping or rdp to internal LAN:
         #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
          #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
         The running-config it created is:
    ciscoasa# sh run
    : Saved
    ASA Version 8.4(2)
    hostname ciscoasa
    enable password XXXX encrypted
    passwd XXXX encrypted
    names
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    interface Vlan1
    nameif inside
    security-level 100
    ip address 172.16.1.254 255.255.0.0
    interface Vlan2
    nameif outside
    security-level 0
    pppoe client vpdn group ADSL_Telefonica
    ip address pppoe setroute
    ftp mode passive
    object network obj_any
    subnet 0.0.0.0 0.0.0.0
    object network NETWORK_OBJ_10.0.0.0_24
    subnet 10.0.0.0 255.255.255.0
    object network NETWORK_OBJ_172.16.0.0_16
    subnet 172.16.0.0 255.255.0.0
    access-list test_splitTunnelAcl standard permit 172.16.0.0 255.255.0.0
    pager lines 24
    logging asdm informational
    mtu outside 1500
    mtu inside 1500
    ip local pool test 10.0.0.1-10.0.0.254 mask 255.255.255.0
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    nat (inside,outside) source static NETWORK_OBJ_172.16.0.0_16 NETWORK_OBJ_172.16.0.0_16 destination static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 no-proxy-arp route-lookup
    object network obj_any
    nat (inside,outside) dynamic interface
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa authentication ssh console LOCAL
    http server enable
    http 172.16.0.0 255.255.0.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map interface outside
    crypto ikev1 enable outside
    crypto ikev1 policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    telnet 172.16.0.0 255.255.0.0 inside
    telnet timeout 55
    ssh 172.16.0.0 255.255.0.0 inside
    ssh timeout 55
    console timeout 0
    vpdn group ADSL_Telefonica request dialout pppoe
    vpdn group ADSL_Telefonica localname adslppp@telefonicanetpa
    vpdn group ADSL_Telefonica ppp authentication pap
    vpdn username adslppp@telefonicanetpa password *****
    dhcpd auto_config outside
    dhcpd address 172.16.2.2-172.16.2.129 inside
    dhcpd enable inside
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy test internal
    group-policy test attributes
    dns-server value 172.16.1.1
    vpn-tunnel-protocol ikev1
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value test_splitTunnelAcl
    username test password XXXXXX encrypted privilege 0
    username test attributes
    vpn-group-policy test
    username ignacio password XXXXXXX encrypted
    tunnel-group test type remote-access
    tunnel-group test general-attributes
    address-pool test
    default-group-policy test
    tunnel-group test ipsec-attributes
    ikev1 pre-shared-key *****
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny
      inspect sunrpc
      inspect xdmcp
      inspect sip
      inspect netbios
      inspect tftp
      inspect ip-options
      inspect icmp
    service-policy global_policy global
    prompt hostname context
    no call-home reporting anonymous
    Cryptochecksum:c8935bd572dfd37e81c6aa9f9dc8207c
    : end
    Thank you very much for your help

    Yes, it was a VPN client problem. I was doing test with a WWAN card and it seems it is not compatible with windows 7.
    • The VPN Client on Windows 7 does not support WWAN devices (also called wireless data cards).
    I should have read Release Notes before. Thank you very much for your help and effort.

  • Remote Access VPN on Cisco ASA Problem

    Hi, i configured Remote access VPN on Cisco ASA 8.x as per below configuration.
    Problem is that my internet has stopped working, and default route is just showing stars.
    i can ping internal server 10.110.10.150 fine , which i allowed on VPN ACL, but my other traffic not going to regular internet on my laptop,
    what additional required to force my internet to go to regular internet instead of getting encrypted?
    Also attaching output of route print at the point when VPN is connected.
    ip local pool RA_VPN_POOL 10.1.200.100-10.1.200.150 mask 255.255.255.0
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto dynamic-map RA_VPN 65535 set transform-set ESP-AES-128-SHA
    crypto dynamic-map RA_VPN 65535 set security-association lifetime seconds 28800
    crypto dynamic-map RA_VPN 65535 set security-association lifetime kilobytes 4608000
    crypto map VPN_MAP 65535 ipsec-isakmp dynamic RA_VPN
    crypto map VPN_MAP interface outside
    isakmp enable outside
    crypto isakmp policy 10
    authentication pre-share
    encryption aes
    hash sha
    group 2
    lifetime 86400
    tunnel-group ITT_RA type remote-access
    tunnel-group ITT_RA general-attributes
    address-pool RA_VPN_POOL
    default-group-policy RA_VPN_GP
    tunnel-group ITT_RA ipsec-attributes
    pre-shared-key <group key>
    group-policy RA_VPN_GP internal
    group-policy RA_VPN_GP attributes
    dns-server value 10.0.0.1 10.0.0.2
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value Split_Tunnel_List
    default-domain value mydomain.com
    address-pools value RA_VPN_POOL
    access-list Split_Tunnel_List extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    access-list nonattest extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    nat (inside) 0 access-list nonattest
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway       Interface  Metric
              0.0.0.0          0.0.0.0      10.111.36.1      10.111.36.9          276
              0.0.0.0          0.0.0.0         On-link      10.1.200.100            20
           10.1.200.0    255.255.255.0         On-link      10.1.200.100    276
         10.1.200.100  255.255.255.255         On-link      10.1.200.100    276
         10.1.200.255  255.255.255.255         On-link      10.1.200.100    276
        10.110.10.150  255.255.255.255       10.1.200.1     10.1.200.100    100
          10.111.36.0    255.255.255.0         On-link       10.111.36.9    276

    Hi, i configured Remote access VPN on Cisco ASA 8.x as per below configuration.
    Problem is that my internet has stopped working, and default route is just showing stars.
    i can ping internal server 10.110.10.150 fine , which i allowed on VPN ACL, but my other traffic not going to regular internet on my laptop,
    what additional required to force my internet to go to regular internet instead of getting encrypted?
    Also attaching output of route print at the point when VPN is connected.
    ip local pool RA_VPN_POOL 10.1.200.100-10.1.200.150 mask 255.255.255.0
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto dynamic-map RA_VPN 65535 set transform-set ESP-AES-128-SHA
    crypto dynamic-map RA_VPN 65535 set security-association lifetime seconds 28800
    crypto dynamic-map RA_VPN 65535 set security-association lifetime kilobytes 4608000
    crypto map VPN_MAP 65535 ipsec-isakmp dynamic RA_VPN
    crypto map VPN_MAP interface outside
    isakmp enable outside
    crypto isakmp policy 10
    authentication pre-share
    encryption aes
    hash sha
    group 2
    lifetime 86400
    tunnel-group ITT_RA type remote-access
    tunnel-group ITT_RA general-attributes
    address-pool RA_VPN_POOL
    default-group-policy RA_VPN_GP
    tunnel-group ITT_RA ipsec-attributes
    pre-shared-key <group key>
    group-policy RA_VPN_GP internal
    group-policy RA_VPN_GP attributes
    dns-server value 10.0.0.1 10.0.0.2
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value Split_Tunnel_List
    default-domain value mydomain.com
    address-pools value RA_VPN_POOL
    access-list Split_Tunnel_List extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    access-list nonattest extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    nat (inside) 0 access-list nonattest
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway       Interface  Metric
              0.0.0.0          0.0.0.0      10.111.36.1      10.111.36.9          276
              0.0.0.0          0.0.0.0         On-link      10.1.200.100            20
           10.1.200.0    255.255.255.0         On-link      10.1.200.100    276
         10.1.200.100  255.255.255.255         On-link      10.1.200.100    276
         10.1.200.255  255.255.255.255         On-link      10.1.200.100    276
        10.110.10.150  255.255.255.255       10.1.200.1     10.1.200.100    100
          10.111.36.0    255.255.255.0         On-link       10.111.36.9    276

  • Remote access VPN with Cisco Router - Can not get the Internal Lan .

    Dear Sir ,
    I am doing Remote Access VPN through Cisco Router. Before the real deployment, I want to simulate it with GNS3.Need you help to complete the job .Please see the attachment for Scenario, Configuration and Ping status.
    I am getting IP address when i connect through VPN client .But I can not ping to the internal lan -192.168.1.0.Need your help to sole the issue.
    Below is the IP address of the device.
    Local PC connect with Router -2 (Through MS Loopback) Router -2 Router-1 PC -01
    IP Address :10.10.10.2 Mask : 255.255.255.0 F0/01
    IP address:10.10.10.1
    Mask:255.255.255.0 F0/0
    IP Address :20.20.20.1
    Mask :255.255.255.0
    F0/1
    IP address :192.168.1.3
    Mask:255.255.255.0
    F0/0
    IP address :20.20.20.2
    Mask :255.255.255.0
    F0/1
    IP address :192.168.1.1
    Mask:255.255.255.0
    I can ping from local PC to the network 10.10.10.0 and 20.20.20.0 .Please find the attach file for ping status .So connectivity is ok from my local PC to Remote Router 1 and 2.
    Through Cisco remote vpn client, I can get connected with the VPN Router R1 (Please see the VPN Client pic.)But cannot ping the network 192.168.1.0
    Need your help to fix the problem.
    Router R2 Configuration :!
    version 12.4
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname R2
    boot-start-marker
    boot-end-marker
    no aaa new-model
    memory-size iomem 5
    no ip icmp rate-limit unreachable
    ip cef
    no ip domain lookup
    ip auth-proxy max-nodata-conns 3
    ip admission max-nodata-conns 3
    ip tcp synwait-time 5
    interface FastEthernet0/0
    ip address 20.20.20.2 255.255.255.0
    duplex auto
    speed auto
    interface FastEthernet0/1
    ip address 10.10.10.1 255.255.255.0
    duplex auto
    speed auto
    ip forward-protocol nd
    no ip http server
    no ip http secure-server
    control-plane
    line con 0
    exec-timeout 0 0
    privilege level 15
    logging synchronous
    line aux 0
    exec-timeout 0 0
    privilege level 15
    logging synchronous
    line vty 0 4
    login
    end
    Router R1 Configuration :
    version 12.4
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname R1
    boot-start-marker
    boot-end-marker
    aaa new-model
    aaa authentication login USERAUTH local
    aaa authorization network NETAUTHORIZE local
    aaa session-id common
    memory-size iomem 5
    no ip icmp rate-limit unreachable
    ip cef
    no ip domain lookup
    ip auth-proxy max-nodata-conns 3
    ip admission max-nodata-conns 3
    username vpnuser password 0 strongpassword
    ip tcp synwait-time 5
    crypto keyring vpnclientskey
    pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123
    crypto isakmp policy 10
    encr 3des
    hash md5
    authentication pre-share
    group 2
    crypto isakmp client configuration group remotevpn
    key cisco123
    dns 192.168.1.2
    wins 192.168.1.2
    domain mycompany.com
    pool vpnpool
    acl VPN-ACL
    crypto isakmp profile remoteclients
    description remote access vpn clients
    keyring vpnclientskey
    match identity group remotevpn
    client authentication list USERAUTH
    isakmp authorization list NETAUTHORIZE
    client configuration address respond
    crypto ipsec transform-set TRSET esp-3des esp-md5-hmac
    crypto dynamic-map DYNMAP 10
    set transform-set TRSET
    set isakmp-profile remoteclients
    crypto map VPNMAP 10 ipsec-isakmp dynamic DYNMAP
    interface FastEthernet0/0
    ip address 20.20.20.1 255.255.255.0
    ip nat outside
    ip virtual-reassembly
    duplex auto
    speed auto
    crypto map VPNMAP
    interface FastEthernet0/1
    ip address 192.168.1.1 255.255.255.0
    ip nat inside
    ip virtual-reassembly
    duplex auto
    speed auto
    ip local pool vpnpool 192.168.50.1 192.168.50.10
    ip forward-protocol nd
    ip route 10.10.10.0 255.255.255.0 FastEthernet0/0
    no ip http server
    no ip http secure-server
    ip nat inside source list NAT-ACL interface FastEthernet0/0 overload
    ip access-list extended NAT-ACL
    deny ip 192.168.1.0 0.0.0.255 192.168.50.0 0.0.0.255
    permit ip 192.168.1.0 0.0.0.255 any
    ip access-list extended VPN-ACL
    permit ip 192.168.1.0 0.0.0.255 192.168.50.0 0.0.0.255
    control-plane
    line con 0
    exec-timeout 0 0
    privilege level 15
    logging synchronous
    line aux 0
    exec-timeout 0 0
    privilege level 15
    logging synchronous
    line vty 0 4
    end

    Dear All,
    I am doing Remote Access VPN through Cisco Router. Before the real deployment, I want to simulate it with GNS3.Need you help to complete the job .
    Please see the attachment for Scenario, Configuration and Ping status. I am getting IP address when i connect through VPN client .But I can not ping to the internal lan -192.168.1.0.Need your help to sole the issue.
    Waiting for your responce .
    --Milon

  • Site-to-Site VPN between Cisco ASA 5505 (8.4) and Cisco Router (IOS 15.2)

    Hi, I'm trying to create Site-to-Site VPN between Cisco ASA 5505 and Cisco Router 3945.
    I've tried create configuration with and without ASA wizard, but anyway it doesn't work.
    Please help me to find where is the issue.
    I have two sites and would like to get access from 192.168.83.0 to 192.168.17.0
    192.168.17.0 --- S1.S1.S1.S1 (IOS Router) ==================== S2.S2.S2.S2 (ASA 5505) --- 192.168.83.0
    Here is my current configuration.
    Thanks for your help.
    IOS Configuration
    version 15.2
    crypto isakmp policy 1
    encr aes 256
    authentication pre-share
    group 2
    crypto isakmp key cisco address 198.0.183.225
    crypto isakmp invalid-spi-recovery
    crypto ipsec transform-set AES-SET esp-aes esp-sha-hmac
    mode transport
    crypto map static-map 1 ipsec-isakmp
    set peer S2.S2.S2.S2
    set transform-set AES-SET
    set pfs group2
    match address 100
    interface GigabitEthernet0/0
    ip address S1.S1.S1.S1 255.255.255.240
    ip nat outside
    ip virtual-reassembly in
    duplex auto
    speed auto
    crypto map static-map
    interface GigabitEthernet0/1
    ip address 192.168.17.1 255.255.255.0
    ip nat inside
    ip virtual-reassembly in
    duplex auto
    speed auto
    access-list 100 permit ip 192.168.17.0 0.0.0.255 192.168.83.0 0.0.0.255
    ASA Configuration
    ASA Version 8.4(3)
    interface Ethernet0/0
    switchport access vlan 2
    interface Vlan1
    nameif inside
    security-level 100
    ip address 192.168.83.1 255.255.255.0
    interface Vlan2
    nameif outside
    security-level 0
    ip address S2.S2.S2.S2 255.255.255.248
    ftp mode passive
    same-security-traffic permit intra-interface
    object network inside-network
    subnet 192.168.83.0 255.255.255.0
    object network datacenter
    host S1.S1.S1.S1
    object network datacenter-network
    subnet 192.168.17.0 255.255.255.0
    object network NETWORK_OBJ_192.168.83.0_24
    subnet 192.168.83.0 255.255.255.0
    access-list outside_access_in extended permit icmp any any echo-reply
    access-list outside_access_in extended deny ip any any log
    access-list outside_cryptomap extended permit ip 192.168.83.0 255.255.255.0 object datacenter-network
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    ip local pool vpn_pool 192.168.83.200-192.168.83.254 mask 255.255.255.0
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    nat (inside,outside) source dynamic inside-network interface
    nat (inside,outside) source static inside-network inside-network destination static inside-network inside-network no-proxy-arp route-lookup
    nat (inside,outside) source static inside-network inside-network destination static datacenter-network datacenter-network no-proxy-arp route-lookup
    nat (inside,outside) source static NETWORK_OBJ_192.168.83.0_24 NETWORK_OBJ_192.168.83.0_24 destination static datacenter-network pdatacenter-network no-proxy-arp route-lookup
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 DEFAULT_GATEWAY 1
    crypto ipsec ikev1 transform-set vpn-transform-set esp-3des esp-sha-hmac
    crypto ipsec ikev1 transform-set vpn-transform-set mode transport
    crypto ipsec ikev1 transform-set L2L_SET esp-aes esp-sha-hmac
    crypto ipsec ikev1 transform-set L2L_SET mode transport
    crypto dynamic-map dyno 10 set ikev1 transform-set vpn-transform-set
    crypto map vpn 1 match address outside_cryptomap
    crypto map vpn 1 set pfs
    crypto map vpn 1 set peer S1.S1.S1.S1
    crypto map vpn 1 set ikev1 transform-set L2L_SET
    crypto map vpn 20 ipsec-isakmp dynamic dyno
    crypto map vpn interface outside
    crypto isakmp nat-traversal 3600
    crypto ikev1 enable outside
    crypto ikev1 policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    crypto ikev1 policy 20
    authentication pre-share
    encryption aes-256
    hash sha
    group 2
    lifetime 86400
    group-policy GroupPolicy_S1.S1.S1.S1 internal
    group-policy GroupPolicy_S1.S1.S1.S1 attributes
    vpn-tunnel-protocol ikev1
    group-policy remote_vpn_policy internal
    group-policy remote_vpn_policy attributes
    vpn-tunnel-protocol ikev1 l2tp-ipsec
    username artem password 8xs7XK3To4s5WfTvtKAutA== nt-encrypted
    username admin password rqiFSVJFung3fvFZ encrypted privilege 15
    tunnel-group DefaultRAGroup general-attributes
    address-pool vpn_pool
    default-group-policy remote_vpn_policy
    tunnel-group DefaultRAGroup ipsec-attributes
    ikev1 pre-shared-key *****
    tunnel-group DefaultRAGroup ppp-attributes
    authentication ms-chap-v2
    tunnel-group S1.S1.S1.S1 type ipsec-l2l
    tunnel-group S1.S1.S1.S1 general-attributes
    default-group-policy GroupPolicy_S1.S1.S1.S1
    tunnel-group S1.S1.S1.S1 ipsec-attributes
    ikev1 pre-shared-key *****
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny
      inspect sunrpc
      inspect xdmcp
      inspect sip
      inspect netbios
      inspect tftp
      inspect ip-options
      inspect icmp
    service-policy global_policy global
    prompt hostname context
    no call-home reporting anonymous
    Cryptochecksum:f55f10c19a0848edd2466d08744556eb
    : end

    Thanks for helping me again. I really appreciate.
    I don't hve any NAT-exemptions in Cisco IOS Router. Transform-set I will change soon, but I've tried with tunnel mode and it didn't work.
    Maybe NAT-exemptions is the issue. Can you advice me which exemptions should be in Cisco IOS Router?
    Because on Cisco ASA I guess I have everything.
    Here is show crypto session detail
    router(config)#do show crypto session detail
    Crypto session current status
    Code: C - IKE Configuration mode, D - Dead Peer Detection
    K - Keepalives, N - NAT-traversal, T - cTCP encapsulation
    X - IKE Extended Authentication, F - IKE Fragmentation
    Interface: GigabitEthernet0/0
    Session status: DOWN
    Peer: 198.0.183.225 port 500 fvrf: (none) ivrf: (none)
          Desc: (none)
          Phase1_id: (none)
      IPSEC FLOW: permit ip 192.168.17.0/255.255.255.0 192.168.83.0/255.255.255.0
            Active SAs: 0, origin: crypto map
            Inbound:  #pkts dec'ed 0 drop 0 life (KB/Sec) 0/0
            Outbound: #pkts enc'ed 0 drop 0 life (KB/Sec) 0/0
    Should I see something in crypto isakmp sa?
    pp-border#sh crypto isakmp sa
    IPv4 Crypto ISAKMP SA
    dst             src             state          conn-id status
    IPv6 Crypto ISAKMP SA
    Thanks again for your help.

Maybe you are looking for

  • My iphone 4 will no longer accept my PIN

    Hi! I have had my iphone 4 inactive for some months as I have changed phone. Now I want to hand it over to my son. First, I couldn't make it accept my own PIN-code. Trying to use my son's brand new SIM-card, it will not accept that code either. What

  • Automatically mount USB 3.0 WD External HDD with iMac 24-inch mid-2007

    I am using a 2TB Western Digital (WD) My Book Essential external Hard Disk Drive for my iMac 24-inch mid-2007 to use it as a Time Machine backup disk. This HDD only comes with a USB 3.0 connection.  Function-wise, it works with the iMac and Time mach

  • Airport Express with D-Link router?

    I bought an Airport Express with the specific purpose of connecting an old 1999 iMac to the internet (D-Link wireless router) via the ethernet port. I also thought I could use it to connect other ethernet devices such as my HD-DVD player. I tried to

  • SharePoint 2013 Problem with automatic detection of Site language - default language

    Hi all, we have a SiteCollection that was created with 'english' as default language. On our SharePoint 2013 environment we have installed the 'german' and 'french' language pack. Both languages are activated as alternative languages on that SiteColl

  • 'Share Name ID' Terms and Conditions Questions

    Sorry for the double post - I had originally, by habit, posted this in the Droid Razr forum, but realize now it would be better here. I would rather have my Verizon number display my name than the generic "Wireless Caller" and the instructions for ho