Solved

Cisco VPN no longer works - PIX 515e

Posted on 2013-11-08
11
365 Views
Last Modified: 2014-07-19
Hi Expert guru's,

I'm having an issue here where our Cisco VPN no longer works. Yesterday, our PIX 515e took a crap and I had to restore the config file. Firewall is back up and operational now, but issue is now management is unable to connect via VPN.

We uses Version 4.6.03 & 5.0.07 of the VPN client. I compared both config files side by side and both are identical. I don't understand why it's not working and my Cisco knowledge is limited.

Here is the log that I received when trying to connect:

Any help is greatly appreciated! Thank you.


------------------------------------------------------------------------------
Cisco Systems VPN Client Version 4.6.03.0021
Copyright (C) 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Program Files\Cisco Systems\VPN Client\

1      10:05:54.437  11/08/13  Sev=Warning/3    IKE/0xE3000056
The received HASH payload cannot be verified

2      10:05:54.453  11/08/13  Sev=Warning/2    IKE/0xE300007D
Hash verification failed... may be configured with invalid group password.

3      10:05:54.453  11/08/13  Sev=Warning/2    IKE/0xE3000099
Failed to authenticate peer (Navigator:904)

4      10:05:54.453  11/08/13  Sev=Warning/2    IKE/0xE30000A5
Unexpected SW error occurred while processing Aggressive Mode negotiator:(Navigator:2202)

5      10:06:05.109  11/08/13  Sev=Warning/3    IKE/0xE3000056
The received HASH payload cannot be verified

6      10:06:05.109  11/08/13  Sev=Warning/2    IKE/0xE300007D
Hash verification failed... may be configured with invalid group password.

7      10:06:05.109  11/08/13  Sev=Warning/2    IKE/0xE3000099
Failed to authenticate peer (Navigator:904)

8      10:06:05.109  11/08/13  Sev=Warning/2    IKE/0xE30000A5
Unexpected SW error occurred while processing Aggressive Mode negotiator:(Navigator:2202)
0
Comment
  • 5
  • 5
11 Comments
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39634341
I think you might want to look at:

Hash verification failed... may be configured with invalid group password

Do you still know what the group password is or should be?
0
 
LVL 36

Expert Comment

by:ArneLovius
ID: 39634362
I've not seen a PIX just lose it's config before.

however, from your log above

Hash verification failed... may be configured with invalid group password.

Open in new window


I would check the Cisco client prf file to make sure that the group password has not changed between the backup that you restored, and the live config when it was running.

Although the password is encrypted in the prf file, there are several tools that can decrypt it.

I use rancid to ensure that any changes to the config are automatically archived.
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39634363
You should have something like:
tunnel-group RAVPN ipsec-attributes
pre-shared-key *****


In your config. Might differ a bit, depending on the version of the PIX.
This is where the group password is set. This is also set in the VPN client.
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39634368
This is also set in the VPN client.
Ah, like ArneLovius said.
Have to remember to refresh before posting :)
0
 

Author Comment

by:ZerodotZerodotZerodotZero
ID: 39634401
Group password has been reset. New Group name has been setup with a new Group password and still no go.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39634411
Just to make sure, you also changed that at the clients side?
0
 

Author Comment

by:ZerodotZerodotZerodotZero
ID: 39634436
yes, on the client side as well.
0
 

Author Comment

by:ZerodotZerodotZerodotZero
ID: 39634476
I may have figured this out. Will confirm.
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39634586
Do let us know :)
0
 

Accepted Solution

by:
ZerodotZerodotZerodotZero earned 0 total points
ID: 39634828
I'm not sure if this have anything to do with it, but I rebooted the firewall and now everything seems to be working.

Management confirmed they are all able to get connected.
0
 

Author Closing Comment

by:ZerodotZerodotZerodotZero
ID: 40206059
Rebooted the firewall resolved the issue.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Read about achieving the basic levels of HRIS security in the workplace.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now