I am trying without any luck to establish a VPN for my users on a Cisco 5505.
If I try to use a Cisco VPN Client to get into my network I just see it try to connect then say "Not Connected".
If I try Cisco AnyConnect I get:
The secure gateway has rejected the agent's VPN connect or reconnect request. A new connection requires re-authentication and must be started manually. The following message was received from the secure gateway: No address available for SVC connection"
I'm sorry if I've made a mess of this configuration; obviously I am not the expert here. That's why I'm asking you! I don't even know where to start with troubleshooting at this point and any help would be so greatly appreciated.
: Saved:ASA Version 8.2(5) !hostname ciscoasadomain-name xxxxxxxxxx.lanenable password lHQxHwdBe5WuQL9p encryptedpasswd 2KFQnbNIdI.2KYOU encryptednames!interface Ethernet0/0 switchport access vlan 2!interface Ethernet0/1!interface Ethernet0/2!interface Ethernet0/3!interface Ethernet0/4!interface Ethernet0/5!interface Ethernet0/6!interface Ethernet0/7!interface Vlan1 nameif inside security-level 100 ip address 10.0.1.6 255.255.255.0 !interface Vlan2 nameif outside security-level 0 ip address xx.xx.xx.xx 255.255.255.248 !ftp mode passivedns domain-lookup insidedns domain-lookup outsidedns server-group DefaultDNS name-server 10.0.1.2 domain-name xxxxxxxxx.lanobject-group service DM_INLINE_SERVICE_1 service-object ip service-object tcp eq pptp access-list test extended permit icmp any any echo-reply access-list test extended permit icmp any any time-exceeded access-list test extended permit icmp any any unreachable access-list inside_nat0_outbound extended permit ip any 10.0.1.230 255.255.255.254 access-list inside_nat0_outbound extended permit ip any 10.0.1.224 255.255.255.240 access-list inside_nat0_outbound extended permit ip any 10.0.1.208 255.255.255.248 access-list inside_nat0_outbound extended permit ip any 10.0.1.224 255.255.255.224 access-list inside_access_in_1 extended permit ip any interface outside access-list inside_access_in_1 extended permit tcp any any eq pptp access-list inside_access_in_1 extended permit ip any any access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 any any access-list outside_access_in extended permit tcp any any eq pptp pager lines 24logging asdm informationalmtu inside 1500mtu outside 1500ip local pool testpool 10.0.1.230-10.0.1.235 mask 255.255.255.0ip local pool tp2 10.0.1.210-10.0.1.215 mask 255.255.255.0ip local pool tp4 10.0.1.236-10.0.1.238ip local pool tp5 10.0.1.239-10.0.1.240 mask 255.255.255.0no failovericmp unreachable rate-limit 1 burst-size 1icmp permit any insideicmp permit host xx.xx.xx.xx insideicmp permit any outsideicmp permit host xx.xx.xx.xx outsideno asdm history enablearp timeout 14400global (outside) 1 interfacenat (inside) 0 access-list inside_nat0_outboundnat (inside) 1 0.0.0.0 0.0.0.0access-group inside_access_in_1 in interface insideaccess-group outside_access_in in interface outsideroute outside 0.0.0.0 0.0.0.0 xx.xx.xx.xx 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutetimeout tcp-proxy-reassembly 0:01:00timeout floating-conn 0:00:00dynamic-access-policy-record DfltAccessPolicyaaa-server sg1 protocol ntaaa-server sg1 (inside) host 10.0.1.2 timeout 5 nt-auth-domain-controller claritydc01aaa authorization command LOCAL http server enablehttp 10.0.1.0 255.255.255.0 insidehttp 192.168.1.0 255.255.255.0 insideno snmp-server locationno snmp-server contactsnmp-server enable traps snmp authentication linkup linkdown coldstartcrypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transportcrypto ipsec security-association lifetime seconds 28800crypto ipsec security-association lifetime kilobytes 4608000crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAPcrypto map outside_map interface outsidecrypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAPcrypto map inside_map interface insidecrypto isakmp enable insidecrypto isakmp enable outsidecrypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400crypto isakmp policy 30 authentication crack encryption 3des hash sha group 2 lifetime 86400no vpn-addr-assign aaano vpn-addr-assign dhcpvpn-addr-assign local reuse-delay 5telnet timeout 5ssh timeout 5console timeout 0dhcpd auto_config outside!dhcpd address 10.0.1.10-10.0.1.254 inside!threat-detection basic-threatthreat-detection statistics access-listthreat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200webvpn enable inside enable outside svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1 svc profiles 1 disk0:/1.xml svc enablegroup-policy tg1 internalgroup-policy tg1 attributes dns-server value 10.0.1.2 8.8.8.8 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn default-domain value clarityhealth.langroup-policy tg2 internalgroup-policy tg2 attributes dns-server value 10.0.1.2 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn default-domain value clarityhealth.langroup-policy tg3 internalgroup-policy tg3 attributes dns-server value 10.0.1.2 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn default-domain value clarityhealth.langroup-policy DefaultRAGroup_2 internalgroup-policy DefaultRAGroup_2 attributes dns-server value 10.0.1.2 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn default-domain value clarityhealth.langroup-policy DefaultRAGroup internalgroup-policy DefaultRAGroup attributes wins-server value 10.0.1.2 dns-server value 10.0.1.2 8.8.8.8 vpn-tunnel-protocol l2tp-ipsec default-domain value clarityhealth.lan webvpn svc profiles value 1group-policy DefaultRAGroup_1 internalgroup-policy DefaultRAGroup_1 attributes wins-server value 10.0.1.2 dns-server value 10.0.1.2 8.8.8.8 vpn-tunnel-protocol IPSec l2tp-ipsec default-domain value clarityhealth.langroup-policy DfltGrpPolicy attributes vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn webvpn svc ask none default webvpnusername ebean1 password nhyjEnn78yb2zr2h encrypted privilege 15username ebean password nhyjEnn78yb2zr2h encrypted privilege 15username ebean attributes vpn-group-policy DfltGrpPolicyusername jcormier password KyNRuhU3CB4xUr.T encrypted privilege 15username dnutt password ha4goHg7oOS52cXA encrypted privilege 15username dnutt attributes vpn-group-policy DfltGrpPolicytunnel-group DefaultRAGroup general-attributes address-pool (outside) tp4 address-pool testpool address-pool tp2 address-pool tp5 authentication-server-group (inside) LOCAL default-group-policy DefaultRAGroup_2tunnel-group DefaultRAGroup ipsec-attributes pre-shared-key *****tunnel-group tg1 type remote-accesstunnel-group tg1 general-attributes address-pool testpool default-group-policy tg1tunnel-group tg1 ipsec-attributes pre-shared-key *****tunnel-group tg2 type remote-accesstunnel-group tg2 general-attributes address-pool testpool default-group-policy tg2tunnel-group tg2 ipsec-attributes pre-shared-key *****tunnel-group tg3 type remote-accesstunnel-group tg3 general-attributes address-pool testpool default-group-policy tg3tunnel-group ClientVPN type remote-accesstunnel-group ClientVPN general-attributes address-pool testpool!class-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options inspect icmp !service-policy global_policy globalprompt hostname context no call-home reporting anonymousCryptochecksum:10657dc55ac14390aa07a61b5c32c36a: endasdm location xx.xx.xx.xx 255.255.255.255 insideno asdm history enable