Guys,

Ive completed the Proctor labs Security Ebook lab 3 on POD 106 today, and
had some issues with tunnel groups while doing a L2TP with IPsec to the PIX.

The question asked to allow a VPN from any source to connect to the PIX
without the use of a vpn client.
Whenever i tried to connect to the PIX via the XP workstation it would
timeout and the PIX log would display the following meesage.

IX-4-713903: Group = 192.1.49.100, IP = 192.1.49.100, Can't find a valid
tunnel group, aborting...!
%PIX-7-715065: Group = 192.1.49.100, IP = 192.1.49.100, IKE MM Responder FSM
error history (struct &0x28e7d58)  <state>, <event>:  MM_DONE,
EV_ERROR-->MM_BLD_MSG4, EV_GROUP_LOOKUP-->MM_BLD_MSG4,
EV_TEST_CERT-->MM_BLD_MSG4, EV_BLD_MSG4-->MM_BLD_MSG4,
EV_TEST_CRACK-->MM_BLD_MSG4, EV_SECRET_KEY_OK-->MM_BLD_MSG4,
NullEvent-->MM_BLD_MSG4, EV_GEN_SECRET_KEY
%PIX-7-713906: Group = 192.1.49.100, IP = 192.1.49.100, IKE SA MM:dc270f2c
terminating:  flags 0x01000002, refcnt 0, tuncnt 0

This is a new on me. Ive not had a huge amount of exposure to L2TP but
thought I had covered all the bases.
Tunnel groups, group policies dynamic maps etc.

Even tried the solution config but still the same.
Any thoughts would be appreciated?

(Full config and log attached!)

thanks
Stu


-- 
Stuart Hare

stuart.h...@gmail.com
PIX# sh log
Syslog logging: enabled
    Facility: 20
    Timestamp logging: disabled
    Standby logging: disabled
    Deny Conn when Queue Full: disabled
    Console logging: disabled
    Monitor logging: disabled
    Buffer logging: level debugging, 775 messages logged
    Trap logging: disabled
    History logging: disabled
    Device ID: disabled
    Mail logging: disabled
    ASDM logging: disabled
'tunnel-group pixL2TP general-attributes' command.
%PIX-5-111008: User 'enable_15' executed the 'default-group-policy L2TP_GP' 
command.
%PIX-5-111008: User 'enable_15' executed the 'address-pool VPN' command.
%PIX-5-111008: User 'enable_15' executed the 'tunnel-group pixL2TP 
ipsec-attributes' command.
%PIX-5-111008: User 'enable_15' executed the 'pre-shared-key *' command.
%PIX-5-111005: console end configuration: OK
%PIX-5-111001: Begin configuration: console writing to memory
%PIX-5-111004: console end configuration: OK
%PIX-5-111008: User 'enable_15' executed the 'write' command.
%PIX-7-609001: Built local-host outside:192.1.49.100
%PIX-6-302015: Built inbound UDP connection 122 for outside:192.1.49.100/500 
(192.1.49.100/500) to NP Identity Ifc:6.3.46.20/500 (6.3.46.20/500)
%PIX-7-713236: IP = 192.1.49.100, IKE_DECODE RECEIVED Message (msgid=0) with 
payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) 
+ NONE (0) total length : 312
%PIX-7-715047: IP = 192.1.49.100, processing SA payload
%PIX-7-713906: IP = 192.1.49.100, Oakley proposal is acceptable
%PIX-7-715047: IP = 192.1.49.100, processing VID payload
%PIX-7-715047: IP = 192.1.49.100, processing VID payload
%PIX-7-715049: IP = 192.1.49.100, Received Fragmentation VID
%PIX-7-715047: IP = 192.1.49.100, processing VID payload
%PIX-7-715049: IP = 192.1.49.100, Received NAT-Traversal ver 02 VID
%PIX-7-715047: IP = 192.1.49.100, processing VID payload
%PIX-7-715047: IP = 192.1.49.100, processing IKE SA payload
%PIX-7-715028: IP = 192.1.49.100, IKE SA Proposal # 1, Transform # 3 acceptable 
 Matches global IKE entry # 2
%PIX-7-715046: IP = 192.1.49.100, constructing ISAKMP SA payload
%PIX-7-715046: IP = 192.1.49.100, constructing Fragmentation VID + extended 
capabilities payload
%PIX-7-713236: IP = 192.1.49.100, IKE_DECODE SENDING Message (msgid=0) with 
payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 104
%PIX-7-713236: IP = 192.1.49.100, IKE_DECODE RECEIVED Message (msgid=0) with 
payloads : HDR + KE (4) + NONCE (10) + NONE (0) total length : 184
%PIX-7-715047: IP = 192.1.49.100, processing ke payload
%PIX-7-715047: IP = 192.1.49.100, processing ISA_KE payload
%PIX-7-715047: IP = 192.1.49.100, processing nonce payload
%PIX-7-715046: IP = 192.1.49.100, constructing ke payload
%PIX-7-715046: IP = 192.1.49.100, constructing nonce payload
%PIX-7-715046: IP = 192.1.49.100, constructing Cisco Unity VID payload
%PIX-7-715046: IP = 192.1.49.100, constructing xauth V6 VID payload
%PIX-7-715048: IP = 192.1.49.100, Send IOS VID
%PIX-7-715038: IP = 192.1.49.100, Constructing ASA spoofing IOS Vendor ID 
payload (version: 1.0.0, capabilities: 20000001)
%PIX-7-715046: IP = 192.1.49.100, constructing VID payload
%PIX-7-715048: IP = 192.1.49.100, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
%PIX-4-713903: Group = 192.1.49.100, IP = 192.1.49.100, Can't find a valid 
tunnel group, aborting...!
%PIX-7-715065: Group = 192.1.49.100, IP = 192.1.49.100, IKE MM Responder FSM 
error history (struct &0x28e7d58)  <state>, <event>:  MM_DONE, 
EV_ERROR-->MM_BLD_MSG4, EV_GROUP_LOOKUP-->MM_BLD_MSG4, 
EV_TEST_CERT-->MM_BLD_MSG4, EV_BLD_MSG4-->MM_BLD_MSG4, 
EV_TEST_CRACK-->MM_BLD_MSG4, EV_SECRET_KEY_OK-->MM_BLD_MSG4, 
NullEvent-->MM_BLD_MSG4, EV_GEN_SECRET_KEY
%PIX-7-713906: Group = 192.1.49.100, IP = 192.1.49.100, IKE SA MM:dc270f2c 
terminating:  flags 0x01000002, refcnt 0, tuncnt 0
%PIX-7-713906: Group = 192.1.49.100, IP = 192.1.49.100, sending delete/delete 
with reason message
%PIX-3-713902: Group = 192.1.49.100, IP = 192.1.49.100, Removing peer from peer 
table failed, no match!
%PIX-4-713903: Group = 192.1.49.100, IP = 192.1.49.100, Error: Unable to remove 
PeerTblEntry
%PIX-4-713903: IP = 192.1.49.100, Header invalid, missing SA payload! (next 
payload = 4)
%PIX-7-713236: IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + 
NOTIFY (11) + NONE (0) total length : 68
%PIX-4-713903: IP = 192.1.49.100, Header invalid, missing SA payload! (next 
payload = 4)
%PIX-7-713236: IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + 
NOTIFY (11) + NONE (0) total length : 68
PIX#               
PIX# 



sh run 
: Saved
:
PIX Version 7.2(2) 
!
hostname PIX
enable password 8Ry2YjIyt7RRXU24 encrypted
names
!
interface Ethernet0
 nameif outside
 security-level 0
 ip address 6.3.46.20 255.255.255.0 
!
interface Ethernet0.1
 vlan 32
 nameif inside
 security-level 100
 ip address 6.3.32.20 255.255.255.0 
!
interface Ethernet1
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet4
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet5
 shutdown
 no nameif
 no security-level
 no ip address
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
pager lines 24
logging enable
logging buffered debugging
mtu outside 1500
mtu inside 1500
ip local pool VPN 192.168.99.1-192.168.99.254 mask 255.255.255.0
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
!
router ospf 1
 network 6.3.46.0 255.255.255.0 area 0
 log-adj-changes
 redistribute ospf 32 subnets
!
router ospf 32
 network 6.3.32.0 255.255.255.0 area 32
 log-adj-changes
 default-information originate always
!
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
aaa-server ACS protocol tacacs+
aaa-server ACS (outside) host 6.3.46.100
 timeout 5
 key cisco
group-policy L2TP_GP internal
group-policy L2TP_GP attributes
 vpn-tunnel-protocol l2tp-ipsec 
username vpnu password mANo8HAtyABdoKeO encrypted
username cisco password 3USUcOPFUiMCO4Jk encrypted
aaa authentication ssh console ACS LOCAL
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set TS esp-3des esp-md5-hmac 
crypto ipsec transform-set TS mode transport
crypto dynamic-map DM 10 set transform-set TS
crypto dynamic-map DM 10 set reverse-route
crypto map CRM 10 ipsec-isakmp dynamic DM
crypto map CRM interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash md5
 group 2
 lifetime 86400
tunnel-group L2TP type ipsec-ra
tunnel-group L2TP general-attributes
 address-pool VPN
 default-group-policy L2TP_GP
tunnel-group L2TP ipsec-attributes
 pre-shared-key *
telnet timeout 5
ssh 6.3.46.100 255.255.255.255 outside
ssh 6.3.32.32 255.255.255.255 inside
ssh timeout 5
console timeout 0
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny 
  inspect sunrpc 
  inspect xdmcp 
  inspect sip 
  inspect netbios 
  inspect tftp 
  inspect icmp 
!
service-policy global_policy global
prompt hostname context 
Cryptochecksum:b25f658827f2b39962754e3e5553cb06
: end
PIX#

Reply via email to