Cisco Vpn Client Error 413 User Authentication Failed
Contents |
Start here for a quick overview of the site Help Center Detailed answers to any questions you might have Meta Discuss the workings and policies of this site About secure vpn connection terminated locally by the client. reason 413 user authentication failed Us Learn more about Stack Overflow the company Business Learn more about hiring cisco vpn error 413 windows 8 developers or posting ads with us Server Fault Questions Tags Users Badges Unanswered Ask Question _ Server Fault is a secure vpn connection terminated locally by the client reason 413 windows 7 question and answer site for system and network administrators. Join them; it only takes a minute: Sign up Here's how it works: Anybody can ask a question Anybody can answer The best answers cisco vpn client error 412 are voted up and rise to the top How to troubleshoot Cisco VPN Client Authentication Error 413? up vote 3 down vote favorite I'm a software developer contractor, and I've been given Cisco VPN access to a customer's network. It's a typical set up, using an RSA SecureID soft token, and I'm successfully able to connect through VPN Client (v 5.0.07.0440) when I run it within a
Cisco Vpn Client Error 414
VirtualBox instance (Win 7) on my development workstation. However, when I run VPN Client directly on the development workstation's OS itself (also Win 7), it has been failing, and gives me Authentication Error 413. That error is normally attributed to bad credentials having been entered, and every troubleshooting reference I've found points to user error being the only possible cause. Yet I'm certain that's not the issue here, as I can easily prove to myself when using the VPN Client on the VM and changing nothing else. I'm at a loss as to what that relevant difference is between the two environments. Any guidance would be appreciated. Log from VPN Client follows. (I've redacted specific server & IP values and replaced them with {text}.) Cisco Systems VPN Client Version 5.0.07.0440 Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 6.1.7601 Service Pack 1 1 15:54:10.121 01/24/14 Sev=Info/4 CM/0x63100002 Begin connection process 2 15:54:10.132 01/24/14 Sev=Info/4 CM/0x63100004 Establish secure connection 3 15:54:10.132 01/24/14 Sev=Info/4 CM/0x63100024 Attempt connection with server "{server name}" 4 15:54:10.139 01/24/14 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with {IP}. 5 15:54:10.144 01/24/14 Sev=Info/4 IKE/0x63000001 Starting IKE Phase 1 Negotiation
VPN Service has not been started. Please start this service and try again. Secure VPN Connection terminated locally by the client.
Cisco Vpn Client Error 401
Reason 403: Unable to contact the security gateway. Secure VPN Connection del_reason_we_failed_auth terminated locally by the Client. 412: The remote peer is no longer responding. Secure VPN connection terminated locally vpn connection terminated locally by the client reason 412 by the client. Reason 413: User authentication failed The given combination UGent login name /password is incorrect. Forgot your password? Reason 421: Failed to establish a connection to http://serverfault.com/questions/569765/how-to-troubleshoot-cisco-vpn-client-authentication-error-413 your ISP. Cisco VPN Client displays the message "Reason 422": Lost contact with the security gateway. Check your network connection". The connection to the RoamNet VPN Gateway is no longer available. Secure VPN Connection terminated locally by the Client. Reason 429: Unable to resolve server address. Secure VPN Connection terminated locally by the Client. Reason 442: Failed http://helpdesk.ugent.be/vpn/en/faq_cisco.php?id=413 to enable Virtual Adapter. Error 1609: An error occurred while applying security settings. Authenticated ... Error 1722: There is a problem with this Windows Installer package. A program run as part of the setup did not finish as expected. Contact your support personnel or package vendor. (error when installing Cisco) Error 28000 (error when installing Cisco because there is still (a part of) an old installation present on the system) When installing Cisco, a 'DNE error' occurs and you are asked to restart Windows XP When starting the VPN connection, the computer shuts down (or generates a blue screen). Error 427: unknown error occurred at peer. Mac Error 51: Unable to communicate with the VPN subsystem top Contact Helpdesk Follow the announcements of the helpdesk on Other UGent sites: Home UGent | Minerva | Oasis ©2016Ghent University, disclaimer Paginanavigatie Helpdesk ICT UGentNet E-mail Account & password Athena & software Central disk space Your website Security Home > Vpn > En > Faq cisco Announcements| Contact helpdesk NL|EN
route to cisco vpn client host The remote host or network may be down. Please try the request again. Your cache administrator is webmaster. Generated Thu, 06 Oct 2016 04:51:47 GMT by s_hv1000 (squid/3.5.20)
and configured a new Cisco ASA 5510. The VPN worked for a few days. Now, it doesn’t work (it may be some configurations changed). Whenever the VPN client (v3.6) tries to access the VPN, it displays the login screen. After entering the username and password, you will receive “Secure VPN connection terminated locally. Reason 413: user authentication failed”. Any suggestions? ASA Version 7.0(5) ! hostname chicagotech domain-name default.domain.invalid enable password BXdBI/nCX9W8gnaT encrypted names name 192.168.0.114 Chicagotech name 192.168.0.112 IBM name 192.168.0.117 Outer name 192.168.102.0 DMZ name 192.168.0.213 Color name 192.168.0.95 USA8200 dns-guard ! interface Ethernet0/0 nameif Outside security-level 0 ip address x.x.x.37 255.255.255.248 ! interface Ethernet0/1 nameif Inside security-level 100 ip address 192.168.0.250 255.255.255.0 ! interface Ethernet0/2 nameif DMZ security-level 50 ip address 192.168.102.250 255.255.255.0 ! interface Management0/0 nameif management security-level 100 no ip address management-only ! ftp mode passive access-list tac extended permit ip any host x.x.x.10 access-list tac extended permit ip host x.x.x.10 any access-list out_to_inside extended permit tcp any host x.x.x.34 eq www access-list out_to_inside extended permit tcp any host x.x.x.34 eq 8080 access-list out_to_inside extended permit tcp any host x.x.x.34 eq 8383 access-list out_to_inside extended permit tcp any host x.x.x.36 eq www access-list out_to_inside extended permit tcp any host x.x.x.34 eq smtp access-list out_to_inside extended permit tcp any host x.x.x.34 eq pop3 access-list out_to_inside extended permit tcp any host x.x.x.34 eq 3389 access-list out_to_inside extended permit tcp any host x.x.x.34 eq 13001 access-list out_to_inside extended permit tcp any host x.x.x.36 eq 13001 access-list out_to_inside extended permit tcp any host x.x.x.36 eq 3389 access-list out_to_inside extended permit tcp any host x.x.x.36 eq pop3 access-list out_to_inside extended permit tcp any host x.x.x.36 eq smtp access-list out_to_inside extended permit tcp any host x.x.x.36 eq 8383 access-list out_to_inside extended permit icmp any any access-list out_to_inside extended permit tcp any host x.x.x.35 eq www access-list out_to_inside extended permit tcp any host x.x.x.38 eq www access-list out_to_inside extended permit tcp any host x.x.x.35 eq 8383 access-list out_to_inside extended permit tcp any host x.x.x.35 eq smtp access-list out_to_inside extended permit tcp any host x.x.x.35 eq pop3 access-list out_to_inside extended permit tcp any host 1x.x.x.36 eq pptp access-list Inside_nat0_outbound extended permit ip any 192.168.101.0