• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 517
  • Last Modified:

asa5505 to 3000 concentrator has intermittent connection

Cicso asa5505 8.2.5 cant keep a solid connection to Cisco VPN 3000 concentrator.
This is 5505 config:
# sh run
: Saved
ASA Version 8.2(5)
hostname kworobiec-asa
domain-name necam.com
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
interface Ethernet0/0
 switchport access vlan 2
 speed 100
 duplex full
interface Ethernet0/1
 speed 100
 duplex full
interface Ethernet0/2
 speed 100
 duplex full
interface Ethernet0/3
 speed 100
 duplex full  
interface Ethernet0/4
 speed 100
 duplex full
interface Ethernet0/5
 speed 100
 duplex full
interface Ethernet0/6
interface Ethernet0/7
interface Vlan1
 nameif inside
 security-level 100
 ip address
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute
ftp mode passive
dns server-group DefaultDNS
 domain-name necam.com
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto isakmp policy 65535
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
management-access inside
dhcpd dns
dhcpd wins
dhcpd auto_config outside
dhcpd address inside
dhcpd enable inside
vpnclient server
vpnclient mode network-extension-mode
vpnclient vpngroup VPN-3002 password *****
vpnclient username kworobiec password *****
vpnclient management clear
vpnclient enable
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny  
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip  
  inspect xdmcp
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
: end

I used a sample asa config, but it was 8.2.1, anyone think this is the problem?
The one with 8.2.1 apparently works.
  • 7
  • 2
1 Solution
So, you are trying to use the ASA as a EZVPN client to the VPN3000 that is not designed to be a EZVPN server?
I suggest setting up a static LAN-2-LAN VPN tunnel
dc0ntrerasAuthor Commented:
We have several other ASA's configured the same way that are terminating on that VPN3000.  Any other ideas?
David C.
Wan link? Is the connection solid? Is it DSL? Cable?
Is there anything different about this configuration than any of the others that work fine? It could be the difference between OS 8.2(1) and this 8.2(5)
Try downgrading to 8.2.1?
WEBINAR: 10 Easy Ways to Lose a Password

Join us on June 27th at 8 am PDT to learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees. We'll cover the importance of multi-factor authentication and how these solutions can better protect your business!

dc0ntrerasAuthor Commented:
ok I will try downgrading it.
dc0ntrerasAuthor Commented:
I cant get 8.2.1 from Cisco website.  It only provides 8.2.2 or 8.0.2-5.  I tried 8.2.2 same results.  Any other ideas?
should I try 8.0.5?
dc0ntrerasAuthor Commented:
OK Lmoore, you said
So, you are trying to use the ASA as a EZVPN client to the VPN3000 that is not designed to be a EZVPN server?
I suggest setting up a static LAN-2-LAN VPN tunnel .

What are you seeing that is telling you that I am using EZVPN?
I have never used teh EZVPN /ADSM software, so I am not sure what the difference in the configuration would look like.  I am trying to setup a site to site/LAN 2 LAN vpn tunnel from an ASA5505 to a 3000 concentrator that already has several ASA's.  
The log on the ASA shows:
Tunnel Rejected: Conflicting protocols specified by tunnel-group and group-policy
This may be what you are referring to, im not for sure though.
The connection is intermittent.  
I tried setting the outside mtu to 1492, no help.
I am stuck.
I am going to try and get a config from a known working ASA.
dc0ntrerasAuthor Commented:
lrmoore, I took the ASA home it does the same thing, so I know its not my connections at work.  Its not the OS, I tried 8.2.2, then I tried the config on another ASA with 7.2.4, does the samething.
dc0ntrerasAuthor Commented:
We had the IP address already in use by another use.  That was the problem.
dc0ntrerasAuthor Commented:
We found the problem with more troubleshooting with cisco.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

  • 7
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now