• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1181
  • Last Modified:

Do I create a site-to-site IPSEC VPN or use EasyVPN with Cisco ASA5505?

Here's the situation.

Windows Server A ----- Cisco ASA 5505 ----- Internet ----- External Company Remote Device ----- External Company Network

Server A NIC with NAT on
Cisco ASA 5505 Internal External
External Company Remote Device (Cisco I think but unkown model)  External IP
External Company Network

We only manage Server A and Cisco ASA 5505 and have no saying in the other network settings.

From the external company we only received
IP Address, Group Authentication Name, Group Authentication Password.

With the Cisco Client from the Windows Server A we can connect to their network via VPN.
This '"works" but we want to use the ASA 5505. in a site-to-site connection. (Because there are now more servers in our network and installing and managing the Cisco VPN client on each machine and making sure it is always connected is a lot of work)

Normally I create a Site to Site connection from an ASA5505 to a Cisco Router or other ASA.
For this connection I need a preshared key.
But now I have no preshared key and the extenal company says they don't use this (or a certificate).
Can I still create a site to site ? Or do I need extra settings?

I saw you could use EasyVPN in client mode but when I create this connection we cannnot reach the internal servers that are NATed. I cannot use EasyVPN and create an Exempt Access List. I receive an error.
[ERROR] vpnclient enable
      * Remove "nat (inside) 0 inside_nat0_outbound"

CONFIG CONFLICT: Configuration that would prevent successful Cisco Easy VPN Remote
operation has been detected, and is listed above. Please resolve the
above configuration conflict(s) and re-enable.

So basically My Question is.
? How can I create a realiable connection from the Cisco ASA5505 to the remote network that works like a site to site VPN connection? Do I use site-to-site IPSec or do I use easyVPN?

  • 5
  • 5
2 Solutions

you should be able to configure the site to site using the vpn wizard. the Group Authentication Password is your preshared key.

ensermoAuthor Commented:
Really? Hmm. Im trying that now. I just received an extra e-mail with a username and password from the external company.
Thus now I have
VPN Endpoint IP Address
Group Authentication Name
Group Authentication Password.
*Username when the client connects
*Password when the client connects.

Are those last ones somethin like xAuth or so?

I keep getting these messages on the logs
6      May 06 2009      14:22:28      713219                              IP =, Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete.
3      May 06 2009      14:22:49      713902                              IP =, Removing peer from peer table failed, no match!
4      May 06 2009      14:22:49      713903                              IP =, Error: Unable to remove PeerTblEntry
5      May 06 2009      14:22:50      713041                              IP =, IKE Initiator: New Phase 1, Intf inside, IKE Peer  local Proxy Address, remote Proxy Address,  Crypto map (outside_map)
what is the of vpn server on the other end?
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

ensermoAuthor Commented:
No idea. They network admins just mail this info and say "it should work".
They keep telling me to use Cisco Client but I've tried a thousand times to tell them we have MORE than one connection and we have an ASA. But I just keep getting this semi copy paste mail with "we tested it and de client works" lol.
That's why Im trying to figure it out myself.
Does it matter? If they configured it as a client-server VPN concentrator will I still be able to create a site-to-site from de ASA (or use the easyVPN?)
try entering this in CLI :
tunnel-group groupname ipsec-attributes
    isakmp ikev1-user-authentication (outside) none
ensermoAuthor Commented:
Using site-to-site VPN didn't work. I believe the ASA doesn't allow a site-to-site with authentication.
since I need to authenticate with a username and password.

After some tweaking I was able to create a connection using the Easy VPN.
I see the connection is made in the log files (PHASE 1 and PHASE 2 completed).
The concection is up

ciscoasa# show crypto isakmp sa

   Active SA: 1
    Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1

1   IKE Peer:
    Type    : user            Role    : initiator
    Rekey   : no              State   : AM_ACTIVE

But I cannot communicate from the ASA or Server A to the External Company Network.

In the logs I see these kind of messages. (we use port 3810 for a service on their internal server

6      May 07 2009      08:24:43      302013      3810      2894      Built outbound TCP connection 6989 for outside: ( to inside: (
6      May 07 2009      08:24:49      302014      3810      2885      Teardown TCP connection 6985 for outside: to inside: duration 0:00:30 bytes 0 SYN Timeout

also these messages when I ping the server. (
6      May 07 2009      08:34:27      302020      512      0      Built outbound ICMP connection for faddr gaddr 10
10.10.10/512 laddr
6      May 07 2009      08:35:33      302021      0      512      Teardown ICMP connection for faddr gaddr laddr

So I believe Im close to the solution.
Could it be something with accesslists? (I cannot change much parameters with easyVPN like Expempt Traffic from Natting etc)
yes you can using the nat0. create an access list permitting only the interesting traffic i.e. allow his subnet to yours  then put

nat (inside) 0 access-list
ensermoAuthor Commented:
That doesnt work with easyVPN since I am the "Client" thus cannot really decide much.

access-list inside_nat0_outbound line 1 extended permit ip
[ERROR] nat (inside) 0 access-list inside_nat0_outbound  tcp 0 0 udp 0

       Policy NAT cannot be be configured with VPN Client enabled.

If you are the client I dont think it will work if they have xauth, unlike a router which can save these credentials.
ensermoAuthor Commented:
Ive solved the problem.

One key thing I forgot is that

Server A has an static mapping to another external IP address ( THAN the address of the ASA. (

Thus the ASA connected via easyVPN to the remote connection BUT static NAT is/was preventing communciaton to ServerA correctly. (packages left correctly to the remote VPN network but on their way back the NAT mapping messed thins up)

I had to map server A only to the ports we needed and somehow it now works. (I can ping and connect to ports on the remote network from serverA)
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: MCSA MCSE Windows Server 2012

This course teaches how to install and configure Windows Server 2012 R2.  It is the first step on your path to becoming a Microsoft Certified Solutions Expert (MCSE).

  • 5
  • 5
Tackle projects and never again get stuck behind a technical roadblock.
Join Now