Cisco VPN no longer works - PIX 515e

Hi Expert guru's,

I'm having an issue here where our Cisco VPN no longer works. Yesterday, our PIX 515e took a crap and I had to restore the config file. Firewall is back up and operational now, but issue is now management is unable to connect via VPN.

We uses Version 4.6.03 & 5.0.07 of the VPN client. I compared both config files side by side and both are identical. I don't understand why it's not working and my Cisco knowledge is limited.

Here is the log that I received when trying to connect:

Any help is greatly appreciated! Thank you.


------------------------------------------------------------------------------
Cisco Systems VPN Client Version 4.6.03.0021
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Program Files\Cisco Systems\VPN Client\

1      10:05:54.437  11/08/13  Sev=Warning/3    IKE/0xE3000056
The received HASH payload cannot be verified

2      10:05:54.453  11/08/13  Sev=Warning/2    IKE/0xE300007D
Hash verification failed... may be configured with invalid group password.

3      10:05:54.453  11/08/13  Sev=Warning/2    IKE/0xE3000099
Failed to authenticate peer (Navigator:904)

4      10:05:54.453  11/08/13  Sev=Warning/2    IKE/0xE30000A5
Unexpected SW error occurred while processing Aggressive Mode negotiator:(Navigator:2202)

5      10:06:05.109  11/08/13  Sev=Warning/3    IKE/0xE3000056
The received HASH payload cannot be verified

6      10:06:05.109  11/08/13  Sev=Warning/2    IKE/0xE300007D
Hash verification failed... may be configured with invalid group password.

7      10:06:05.109  11/08/13  Sev=Warning/2    IKE/0xE3000099
Failed to authenticate peer (Navigator:904)

8      10:06:05.109  11/08/13  Sev=Warning/2    IKE/0xE30000A5
Unexpected SW error occurred while processing Aggressive Mode negotiator:(Navigator:2202)
ZerodotZerodotZerodotZeroAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Ernie BeekExpertCommented:
I think you might want to look at:

Hash verification failed... may be configured with invalid group password

Do you still know what the group password is or should be?
0
ArneLoviusCommented:
I've not seen a PIX just lose it's config before.

however, from your log above

Hash verification failed... may be configured with invalid group password.

Open in new window


I would check the Cisco client prf file to make sure that the group password has not changed between the backup that you restored, and the live config when it was running.

Although the password is encrypted in the prf file, there are several tools that can decrypt it.

I use rancid to ensure that any changes to the config are automatically archived.
0
Ernie BeekExpertCommented:
You should have something like:
tunnel-group RAVPN ipsec-attributes
pre-shared-key *****


In your config. Might differ a bit, depending on the version of the PIX.
This is where the group password is set. This is also set in the VPN client.
0
Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

Ernie BeekExpertCommented:
This is also set in the VPN client.
Ah, like ArneLovius said.
Have to remember to refresh before posting :)
0
ZerodotZerodotZerodotZeroAuthor Commented:
Group password has been reset. New Group name has been setup with a new Group password and still no go.
0
Ernie BeekExpertCommented:
Just to make sure, you also changed that at the clients side?
0
ZerodotZerodotZerodotZeroAuthor Commented:
yes, on the client side as well.
0
ZerodotZerodotZerodotZeroAuthor Commented:
I may have figured this out. Will confirm.
0
Ernie BeekExpertCommented:
Do let us know :)
0
ZerodotZerodotZerodotZeroAuthor Commented:
I'm not sure if this have anything to do with it, but I rebooted the firewall and now everything seems to be working.

Management confirmed they are all able to get connected.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
ZerodotZerodotZerodotZeroAuthor Commented:
Rebooted the firewall resolved the issue.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Network Security

From novice to tech pro — start learning today.