James

Your missing the command "vpdn enable outside" from your config.

regards
derek

----- Original Message -----
From: "James Willard" 
To: 
Sent: Tuesday, August 26, 2003 12:17 AM
Subject: PIX VPN Client Configuration - At my wit's end! [7:74363]


> Hi all,
>
> Thanks in advance for reading this message. I am completely boggled on an
> issue here that I have literally been trying to troubleshoot for some 12
> hours now.
>
> I'm trying to configure a PIX 515E for Cisco VPN Client connectivity.
>
> Here are the relevant parts of my config:
>
> :PIX Version 6.3(1)
> interface ethernet0 auto
> interface ethernet1 auto
> interface ethernet2 auto
> nameif ethernet0 outside security0
> nameif ethernet1 inside security100
> nameif ethernet2 dmz security50
> access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.2.0
> 255.255.255.0
> access-list VPNUser_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
> ip local pool vpnusers 192.168.2.100-192.168.2.254
> nat (inside) 0 access-list nonat
> nat (inside) 10 0.0.0.0 0.0.0.0 0 0
> sysopt connection permit-ipsec
> crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
> crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
> crypto ipsec transform-set vpn esp-3des esp-md5-hmac
> crypto ipsec security-association lifetime seconds 300
> crypto dynamic-map dynmap 30 set transform-set vpn
> crypto map crypto-map-swa 20 ipsec-isakmp dynamic dynmap
> crypto map crypto-map-swa interface outside
> isakmp enable outside
> isakmp identity address
> isakmp nat-traversal 20
> isakmp policy 1 authentication pre-share
> isakmp policy 1 encryption 3des
> isakmp policy 1 hash sha
> isakmp policy 1 group 2
> isakmp policy 1 lifetime 300
> vpngroup VPNUser address-pool vpnusers
> vpngroup VPNUser dns-server 192.168.1.23 192.168.1.22
> vpngroup VPNUser wins-server 192.168.1.21 192.168.1.21
> vpngroup VPNUser split-tunnel VPNUser_splitTunnelAcl
> vpngroup VPNUser idle-time 1800
> vpngroup VPNUser password ********
>
> Let's say the outside interface is 100.100.100.28. These are the networks:
>
> 100.100.100.28 255.255.255.240    (outside)
> 192.168.1.0    255.255.255.0      (inside)
> 192.168.2.0    255.255.255.0      (vpn IP pool)
> 10.0.1.0       255.255.255.0      (dmz)
>
> I can connect with the client just fine, but neither end can ping the
other.
> Say the client machine gets the IP 192.168.2.100 from the pool, it cannot
> ping anything in 192.168.1.x. Conversely, nothing in 192.168.1.x can ping
> 192.168.2.100. The VPN Client side shows packets being encrypted but none
> decrypted. The IPSec SA on the PIX shows packets being encrypted and none
> decrypted.
>
> Also worth noting is that the VPN client status shows "Transparent
> Tunneling: Inactive" on the status page while connecting, even though
isakmp
> nat-traversal is enabled. An ethereal capture shows the client sending ESP
> packets to the PIX but none are coming back.
>
> Please, if anyone has any ideas I would love to hear them. This has been
> driving me crazy!
>
> Thanks,
>
> James Willard
> [EMAIL PROTECTED]
> **Please support GroupStudy by purchasing from the GroupStudy Store:
> http://shop.groupstudy.com
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74391&t=74363
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to