Well guys I labbed this back up in GNS 3 this evening, and the only way i could get this to even remotely work is if I used the default remote access tunnel group.
tunnel-group DefaultRAGroup If i used any other arbitrary name I got the cant find valid tunnel group error. So my question is how did the guys get the following solution to work if its not supported by the device? tunnel-group pixL2TP type ipsec-ra tunnel-group pixL2TP general-attributes address-pool P42 default-group-policy pL2TP tunnel-group pixL2TP ipsec-attributes pre-shared-key * Note i said remotely work, cause although the debug output got to phase 2 complete the tunnel never established as the user name and password kept constantly failing with invalid password even though i tested this account and it was fine. I tried all the methods for ppp authentication under the tunnel-group but none would work. So once again I'm stumped. Sods law ill get this in the lab tho :-( Stu On Sun, Feb 1, 2009 at 5:06 PM, Stuart Hare <stuart.h...@googlemail.com>wrote: > Hey timur > > I too thought it was the ipsec sa so tried a combination of all with no > change. I didn't try changing the pool as suggested though. > I have successfully used the pool in this way many times but as u say not > sure whether it's a problem in this scenario or not.. > > Sent from my iPhone > > On 1 Feb 2009, at 16:54, Timur Snoke <tsn...@hotmail.com> wrote: > > what happens if you change your transform set from md5 to sha? > > in Richard Deal's book The Complete VPN he mentions that sha is not > supported in every combination but md5 is. > the only other difference that I saw was the ip pool for the vpn client... > in the pg it is > ip local pool P42 192.168.99.0 mask 255.255.255.0 > > in yours it is > ip local pool VPN 192.168.99.1-192.168.99.254 mask 255.255.255.0 > > Is there a right way to do the local pool on a pix? is one classful and the > other providing the opportunity to carve out part of a classfull allocation? > > Everything else looks fine. > > Timur Snoke > > > > > ------------------------------ > > Date: Sun, 1 Feb 2009 16:20:15 +0000 > From: stuart.h...@googlemail.com > To: ccie_security@onlinestudylist.com > Subject: [OSL | CCIE_Security] Proctor Labs EBook lab 3 > > > Guys, > > Ive completed the Proctor labs Security Ebook lab 3 on POD 106 today, and > had some issues with tunnel groups while doing a L2TP with IPsec to the PIX. > > The question asked to allow a VPN from any source to connect to the PIX > without the use of a vpn client. > Whenever i tried to connect to the PIX via the XP workstation it would > timeout and the PIX log would display the following meesage. > > IX-4-713903: Group = 192.1.49.100, IP = 192.1.49.100, Can't find a valid > tunnel group, aborting...! > %PIX-7-715065: Group = 192.1.49.100, IP = 192.1.49.100, IKE MM Responder > FSM error history (struct &0x28e7d58) <state>, <event>: MM_DONE, > EV_ERROR-->MM_BLD_MSG4, EV_GROUP_LOOKUP-->MM_BLD_MSG4, > EV_TEST_CERT-->MM_BLD_MSG4, EV_BLD_MSG4-->MM_BLD_MSG4, > EV_TEST_CRACK-->MM_BLD_MSG4, EV_SECRET_KEY_OK-->MM_BLD_MSG4, > NullEvent-->MM_BLD_MSG4, EV_GEN_SECRET_KEY > %PIX-7-713906: Group = 192.1.49.100, IP = 192.1.49.100, IKE SA MM:dc270f2c > terminating: flags 0x01000002, refcnt 0, tuncnt 0 > > This is a new on me. Ive not had a huge amount of exposure to L2TP but > thought I had covered all the bases. > Tunnel groups, group policies dynamic maps etc. > > Even tried the solution config but still the same. > Any thoughts would be appreciated? > > (Full config and log attached!) > > thanks > Stu > > > -- > Stuart Hare > > stuart.h...@gmail.com > > > > ------------------------------ > Windows Live™ Hotmail(R)…more than just e-mail. See how it > works.<http://windowslive.com/howitworks?ocid=TXT_TAGLM_WL_t2_hm_justgotbetter_howitworks_012009> > > -- Stuart Hare stuart.h...@gmail.com -- Stuart Hare stuart.h...@gmail.com