Solved

vpn issue

Posted on 2016-10-25
8
17 Views
Last Modified: 2016-10-31
i was able to successfully create a site to site between asa5506 and tp-link r600vpn, however, when i applied the same settings to asa5515, the tunnel does not come up and always display this on the logs:

       reject the packet, received unexpecting payload: payload id:1
0
Comment
Question by:mwauki
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
8 Comments
 
LVL 94

Expert Comment

by:John Hurst
ID: 41859679
The layout of settings for the other box are probably different even though IPsec VPN is fundamentally the same.

Make a list of the setting of the asa5506 and match these to the settings on the asa5515. Watch for Main vs Aggressive mode (need Main mode). Watch for NAT Traversal and Dead Peer detect settings.

Check the external static and internal addressing to be sure it is correct in the new box.
0
 

Author Comment

by:mwauki
ID: 41861421
thank you, John!  yes i have done that.
0
 

Author Comment

by:mwauki
ID: 41861447
whenever i switch to main on both ends (asa5506 & TP-Link), the tunnel goes down.  so when i switched both back to aggresive mode, tunnel comes back online and able to ping LANs on both ends.
0
Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

 
LVL 94

Expert Comment

by:John Hurst
ID: 41861456
Aggressive mode makes connections easier, whereas Main is more secure. But if Aggressive works, try it.
0
 

Author Comment

by:mwauki
ID: 41861473
yes, Aggressive mode works for the asa5506 and the tp-link but not asa5515 & the tp-link
0
 

Accepted Solution

by:
mwauki earned 0 total points
ID: 41861503
thanks for the support.... had to put encryption and authendication on the tp-link to auto and now asa5515 and tp-link are talking....
0
 
LVL 94

Expert Comment

by:John Hurst
ID: 41861511
Good to know but was that not part of the settings I asked you to review.?
0
 

Author Closing Comment

by:mwauki
ID: 41866616
figured it out myself...
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the Top 10  common Cisco VPN problems are not-matching shared keys. This is an easy one to fix, but not always easy to notice, see the case below. A simple IPsec tunnel between fast Ethernet interfaces of routers SW1 (f1/1) and R1(f0/0). …
Overview Often, we set up VPN appliances where the connected clients are on a separate subnet and the company will have alternate internet connections and do not use this particular device as the gateway for certain servers or clients. In this case…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question