VPN Terminates at the PIX. The problem ended up being that a few internal
hosts did not have thier gateway setup...also...the mail server was a Team
Internet ( appliance )...and it refused to see any other gateway other than
itself...hmmm.
 Anyway....we are providing a work around for the remote user to get his
mail....but after adding a gateway ip and static route to the novell
server...it works. And the adtran TSU had no gateway also...

Thanks for your input though..

Cheers
""Albert Lu""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi,
>
> You mentioned that you were doing static nat on the router, this could
> effect it if the vpn client terminates on the router. The ip addresses
that
> you have statics for is translated to the global IP address, and doesn't
go
> through your vpn, since the access-list in your crypto map doesn't
identify
> it as traffic needing to be encrypted.
>
> Albert
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Dain Deutschman
> Sent: Saturday, February 08, 2003 3:49 AM
> To: [EMAIL PROTECTED]
> Subject: VPN Partial Connectivity [7:62639]
>
>
> Hi,
>
> When connecting a vpn via VPN Client 3.x I am able to ping only certain
> addresses...
> 192.168.1.180 Server
> 192.168.1.10 LAN Station
>
> But Not Others...
> 192.168.1.1 Inside Interface Of PIX
> 192.168.1.2 Mail Server
> 192.168.1.3 CSU/DSU management address
>
> I have a vpn setup as follows:
>
> Vpn Client--INTERNET--1721Router--PIX--LAN
>
> *The 1721 router is doing static nat to the outside   interface of the
pix.
> The vpn terminates at the pix.
>
> *I'm using vpngroup to assign ip info to the client.
>
> * The LAN ip scheme is 192.168.1.0/24 where the first 9 addresses are left
> out of the local dhcp pool
>
> *The vpn client is getting assigned from local-pool range 192.168.2.1-50
>
> *I have a route on the pix "route inside 192.168.2.0 255.255.255.0
> 192.168.1.1
>
> *The inside interface of the pix is 192.168.1.1
>
> Here is my config...
>
> PIX(config)# wr t
> Building configuration...
> : Saved
> :
> PIX Version 6.2(2)
> nameif ethernet0 outside security0
> nameif ethernet1 inside security100
> enable password encrypted
> passwd encrypted
> hostname PIX
> fixup protocol ftp 21
> fixup protocol http 80
> fixup protocol h323 h225 1720
> fixup protocol h323 ras 1718-1719
> fixup protocol ils 389
> fixup protocol rsh 514
> fixup protocol rtsp 554
> fixup protocol smtp 25
> fixup protocol sqlnet 1521
> fixup protocol sip 5060
> fixup protocol skinny 2000
> names
> access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0
> 255.255.255.0
> pager lines 24
> interface ethernet0 10baset
> interface ethernet1 10baset
> mtu outside 1500
> mtu inside 1500
> ip address outside 172.16.2.2 255.255.255.240
> ip address inside 192.168.1.1 255.255.255.0
> ip audit info action alarm
> ip audit attack action alarm
> ip local pool NEWMEX 192.168.2.1-192.168.2.50
> pdm history enable
> arp timeout 14400
> global (outside) 1 172.16.2.3
> nat (inside) 0 access-list 101
> nat (inside) 1 0.0.0.0 0.0.0.0 0 0
> conduit permit icmp any any echo-reply
> conduit permit icmp any any echo
> route outside 0.0.0.0 0.0.0.0 172.16.2.1 1
> route inside 192.168.2.0 255.255.255.0 192.168.1.1 1
> timeout xlate 3:00:00
> timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323
> 0:05:00 si
> p 0:30:00 sip_media 0:02:00
> timeout uauth 0:05:00 absolute
> aaa-server TACACS+ protocol tacacs+
> aaa-server RADIUS protocol radius
> aaa-server LOCAL protocol local
> no snmp-server location
> no snmp-server contact
> snmp-server community public
> no snmp-server enable traps
> floodguard enable
> sysopt connection permit-ipsec
> no sysopt route dnat
> crypto ipsec transform-set myset esp-3des esp-sha-hmac
> crypto dynamic-map dynmap 10 set transform-set myset
> crypto map mymap 1 ipsec-isakmp dynamic dynmap
> crypto map mymap interface outside
> isakmp enable outside
> isakmp identity address
> isakmp policy 10 authentication pre-share
> isakmp policy 10 encryption 3des
> isakmp policy 10 hash sha
> isakmp policy 10 group 2
> isakmp policy 10 lifetime 86400
> vpngroup vpn address-pool NEWMEX
> vpngroup vpn dns-server x.x.x.y x.x.x.z
> vpngroup vpn default-domain domain.com
> vpngroup vpn split-tunnel 101
> vpngroup vpn idle-time 1800
> vpngroup vpn password
> telnet timeout 5
> ssh timeout 5
> dhcpd address 192.168.1.10-192.168.1.42 inside
> dhcpd lease 3600
> dhcpd ping_timeout 750
> dhcpd enable inside
> terminal width 80
> Cryptochecksum:a71ebfc24ae
>
> Any ideas?? I'm sort of stumped at this point. Thanks!
>
> --
> Dain Deutschman
> CCNP, CSS-1, CCNA, MCP, CNA
> Data Communications Manager




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=62773&t=62639
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to