Cisco VPN :: 3845 Pick Up IPSec With Remote Side

Feb 23, 2012

We want to use cisco 3845 and pick up IPSec, with remote side. But I am afraid that cisco 3845 can't handle 155 Mbits over IPsec. We will buy AIM- VPN/ SSL3 card. Is this sufficient?

View 3 Replies


ADVERTISEMENT

Macbook Pro And The Windows Side Wont Pick Up Wifi Signals?

Apr 15, 2011

i have bootcamp installed on my macbook pro and the windows side wont pic up my wifi signal. It did work once and then wen i had a mac update download ever since then the windows side wont recognize my WiFI name or pw,..

View 3 Replies View Related

Using Default Gateway On A Vpn Remote Side?

Oct 17, 2011

As shown in the diagram below, I have a central office and two branch offices, these offices are connected by a private routing service that has no connection to the Internet, the telecommunications operator in each office installs a router with a LAN and a WAN IP and configuration of these devices cannot be changed except the LAN IP. Only the central office network that is 192.168.0.0 have a router that has internet access. Remote offices have no access to the internet, what is needed is that remote offices can access the internet using ADSL router 192.168.0.254 at the central office. There are a small devices in each remote office that must connect to the internet and do not support any configuration except IP, mask and gateway, for example you cannot add a static route. Currently the pcs at remote offices has IP communication with the server from the central office using a static route.Does the solution would be to put some VPN routers between each LAN and the operator's routers (where RT yellow star appears in the diagram) and put the hosts of the two branch offices same IP range that the central office network?

View 3 Replies View Related

RSV400 Router / Using Default Gateway On A Vpn Remote Side?

Oct 17, 2011

I have a central office and two branch offices, these offices are connected by a private routing service that has no connection to the Internet, the telecommunications operator in each office installs a router with a LAN and a WAN IP and configuration of these devices cannot be changed except the LAN IP. Only the central office network that is 192.168.0.0 have a router that has internet access. Remote offices have no access to the internet, what is needed is that remote offices can access the internet using ADSL router 192.168.0.254 at the central office. There are a small devices in each remote office that must connect to the internet and do not support any configuration except IP, mask and gateway, for example you cannot add a static route. Currently the pc's at remote offices has IP communication with the server from the central office using a static route. put some VPN routers between each LAN and the operator's routers (where RT yellow star appears in the diagram) and put the hosts of the two branch offices same IP range that the central office network? I had thought to use RSV400 routers?

View 6 Replies View Related

Cisco VPN :: All Remote Wireless IPSec Remote Clients Fail Connecting To ASA 5500

Sep 12, 2012

We have two ASA 5500 series Firewalls running 8.4(1).  One in New York, another in Atlanta.They are configured identically for simple IPSecV1 remote access for clients.  Authentication is performed by an Radius server local to each site.
 
There are multiple IPSec Site-to-Site tunnels on these ASA's as well but those are not affected by the issues we're having.First, let me start with the famous last words, NOTHING WAS CHANGED.
 
All of a sudden, we were getting reports of remote users to the Atlanta ASA timing out when trying to bring up the tunnel.  They would get prompted for their ID/Password, then nothing until it times out.Sames users going to the NY ASA are fine.After extensive troubleshooting, here is what I've discovered. Remote clients will authenticate fine to the Atlanta Firewall ONLY IF THEY ARE USING A WIRED CONNECTION.
 
If they are using the wireless adapter for their client machine, they will get stuck trying to login to Atlanta.These same clients will get into the New York ASA with no problems using wired or wireless connections.Windows 7 clients use the Shrewsoft VPN client and Mac clients use the Cisco VPN client.  They BOTH BEHAVE the same way and fail to connect to the Atlanta ASA if they use their wireless adapter to initiate the connection.
 
Using myself as an example.
 
1. On my home Win 7 laptop using wireless, I can connect to the NY ASA with no issues. 
 
2. The same creditials USED to work for Atlanta as well but have now stopped working.  I get stuck until it times out.
 
3. I run a wire from my laptop to the FiOS router, then try again using the same credentials to Atlanta and I get RIGHT IN.
 
This makes absolutely no sense to me.  Why would the far end of the cloud care if I have a wired or wireless network adapter?  I should just be an IP address right?  Again, this is beyond my scope of knowledge.We've rebuilt and moved the Radius server to another host in Atlanta in our attempts to troubleshoot to no avail.  We've also rebooted the Atlanta Firewall and nothing changed.
 
We've tried all sorts of remote client combinations.  Wireless Internet access points from different carriers (Clear, Verizon, Sprint) all exhibit the same behavior.  Once I plug the laptops into a wired connection, BAM, they work connecting to Atlanta.  The New York ASA is fine for wired and wireless connections.  Same with some other remote office locations that we have.
 
Below I've detailed the syslog sequence on the Atlanta ASA for both a working wired remote connection and a failed wireless connection.  At first we thought the AAA/Radius server was rejecting us but is shows the same reject message for the working connection.  Again, both MAC and Windows clients show the same sequence.Where the connection fails is the "IKE Phase 1" process.

-------------------------------------------------------------------------------------------------------------------------
WORKING CONNECTION
-------------------------------------------------------------------------------------------------------------------------
 %ASA-6-713172: Automatic NAT Detection Status: Remote end is|is not behind a NAT device This end is|is not behind a NAT device
NAT-Traversal auto-detected NAT.
 %ASA-6-113004: AAA user aaa_type Successful: server = server_IP_address, User = user
 %ASA-6-113005: AAA user authentication Rejected: reason = string: server = server_IP_address, User = user

[code]...

View 1 Replies View Related

Cisco WAN :: 3845-2 - IPSEC From Behind ADSL Modem

Apr 9, 2013

I'm trying to set up an IPSec tunnel between 2 3845 routers that each sit in a private LAN behind an ADSL modem.  Each modem does have a static public IP address from the ISP.
 
Thus:
 
Cisco 3845-1 <-> ADSL modem <-> WAN <-> ADSL modem <-> Cisco 3845-2
 3845-1 
Gi 0/0 - private ip
l
NAT

[code]....
 
So I would like to set up IPSEC between the GI 0/0 interfaces on the 3845's.

View 1 Replies View Related

Cisco WAN :: 3845 - GRE Over IPSEC With Encryption Module

Jun 21, 2011

To configure the GRE tunnel over IPSEC with OSFT via Encryption module from Cisco Router 3845, I have few queries:
 
1. Does the router 3845 support hot swap for encryption module?
2. Does the router require to be rebooted after plug in encryption module?
3. Any samples configuration for GRE tunnel over IPSEC?

View 9 Replies View Related

Cisco WAN :: 3845 - IPSec Encryption Overhead

May 5, 2010

How to reconcile what I've observed on our routers  on a tunnel interface.  The maximum amount of data I can get across the tunnel is 1339 bytes, which seems just a little bit too small. Background: we have two 3845 routers with IOS 12.4(3a) advanced ip services. I have tunnel interfaces on both routers, interface configs are below.
 
crypto ipsec transform-set MY_TSET esp-3des esp-sha-hmac comp-lzs crypto ipsec profile MY_VTIset transform-set MY_TSET
[ Code]..
 
When I test the mtu of the source destination interfaces I get 1500 bytes, as you would expect from an Ethernet connection to a service providers MPLS network. See output below:
 
Router1#ping ip 10.252.0.18 df-bit size 1500
[Code]...
 
When I test the mtu of the tunnels I get 1339 bytes, see the output below.
 
router1#ping ip 10.1.40.133 df-bit size 1340
Type escape sequence to abort.Sending 5, 1340-byte ICMP Echos to 10.1.40.133, timeout is 2 seconds:Packet sent with the DF bit setM.M.MSuccess rate is 0 percent (0/5)
[Code]...
 
That comes to a total of 1420, which is 80 bytes short of the mtu of the source/destination interface of the tunnel.

View 4 Replies View Related

Cisco Switching/Routing :: 1841 - Unable To Ping Remote Gateway Or Hosts On Other Side Of Router

May 30, 2012

I am just setting up a simple scenario with a 1841. Server @ 172.31.1.1 cannot ping 172.31.0.254 or 172.31.0.105. It can ping 172.31.1.250. The router can, on the other hand, ping devices on both networks. This is just for testing routing theory so I don't know why hosts on either side of the network cannot ping each other.
 
I am only using the FastEthernet interfaces on Router 1841.

View 3 Replies View Related

Cisco VPN :: ASA 5520 - Communicate To EzVPN Client Side Internal IP From Server Side

Mar 13, 2013

i configured cisco asa 5520 as cisco ezvpn server and cisco 891 as ezvpn client .the configurtion is working fine.i am using client mode on the ezvpn client side.but my quesion is , is it possible to communicate to ezvpn client side internal ip from the ezvpn server side?and one more thing what is the benefit of network extension mode on the client side and how it will work what are possible changes need to do in the server and the client side.

View 4 Replies View Related

Cisco Firewall :: ASA And UC540 Side-by-side Traffic?

Mar 17, 2013

I'm trying to setup an ASA and a UC540 side by side, to utilize the ASA for data networking and the UC540 for voice. This 'should' work fine, I just seem to be having an issue where the ASA seems to be blocking traffic from the voice network as it passes through.So here is the LAN setup:ASA: 1.1.1.1UC540: 1.1.1.2The UC has a voice vlan 10.1.1.1/24 and a service module at 10.1.10.1/30My PC uses the ASA as its default gateway, 1.1.1.1The ASA then has static routes to the UC networksRoute 10.1.1.1/24 1.1.1.2Route 10.1.10.1/30 1.1.1.2Ping from PC to the UC networks works fine. However, ping from the UC networks to PC fails. ASA logs show traffic being denied due to not having an established connection or something.My guess is that the traffic is being blocked because the egress and ingress paths are different? Traffic from the PC goes to the ASA, then gets routed to the UC and it works. However in the other direction, traffic from the UC is going directly to the PC and bypassing the ASA, because its a directly connected network and doesn't have to route through the ASA to get to the PC. The reply traffic from the PC DOES go through the ASA following its route table, thus the issue of the ASA not seeing the established connection?Same-security inter and intra interface is enabled.So I think I see the issue, I just don't know how to fix it. Is there something I can configure on the ASA to allow for this? My only other option would be to configure a /30 on a new vlan to handle the routing between the UC and ASA or something, but that seems like its going to make this simple setup way too complicated with extra networks, vlans, trunks, etc.I am running ASA version 8.4.5?

View 1 Replies View Related

Linksys Wireless Router :: E1500 LAN-side Works / WAN-side Just Goes Away

Jan 30, 2013

My E1500 enters a state where the LAN-side (broadcast, etc.) works, but the WAN-side (internet connection) just goes away. If I go unplug and replug the E1500 the internet connectivity comes back.When this happens, the wireless indicator on my desktop (Dell with Intel wifi) says I have an internet connection, but I clearly don't.

View 2 Replies View Related

Cisco Firewall :: Allow Local User Access To Remote VPN 3845

May 5, 2011

I have a 3845 router (12.4(13r)T10) with ZBF. On my LAN there is a user who need to access a remote IPSEC VPN server. He is able to get the tunnel but afterwards he cannot connect to any service in the remote LAN. As I'm using zbf I think that I should inspect traffic from my LAN zone to EXT zone, There is a document that describe a solution to this? What IP adressess should I use?

View 2 Replies View Related

Cisco Firewall :: 3845 - Allow Local User Access To Remote VPN

Oct 3, 2011

I have a 3845 router (12.4(13r)T10) with ZBF. On my LAN there is a user who need to access a remote IPSEC VPN server. He is able to get the tunnel but afterwards he cannot connect to any service in the remote LAN. As I'm using zbf I think that I should inspect traffic from my LAN zone to EXT zone

View 3 Replies View Related

Cisco Security :: 3845 - How To Configure Remote Access VPN User Session Timeouts

Mar 22, 2011

I am configuring remote access VPN on a cisco router 3845. Works fine.
 
I was looking for configuring session and idle time configuration for groups and eventually users.
 
I am using the following Cisco VPN remote access configuration :
 
crypto isakmp client configuration group mygroup
key xxx
pool mypool
acl 101
max-logins 3
banner ^CHelloo ^C

Is there any command in cisco ios similar to Cisco ASA  vpn group 1 session-timeout?

View 1 Replies View Related

Cisco VPN :: ASA5510 / Remote IPSEC VPN ASA Behind NAT?

Mar 18, 2012

i want to create Remote IP Sec VPN on Cisco ASA5510.Problem is this 5510ASA is behind another 5520ASA and it dont have any public IP address on any of 5510 interface.if i do static NAT of ASA 5510 Private IP on internet facing 5520 IP Public POOL, then will VPN work on 5510 ASA? and what ports need to forward on 5520 for 5510 to become IPSEC VPN head end

View 1 Replies View Related

Cisco :: ASA 5505 VPN Ipsec Remote Access?

Oct 3, 2011

I have Cisco ASA 5505 and i want to create vpn remote access ...l

so i created and connected to the vpn ...my problem is to reach my Local connection of 192.168.1.0 /24 i put the WAN Connection in the FA0/0 and put my LOCAL AREA CONNECITON into FA0/1 .. so how i can route or translate my connection , and using cisco ASDM 6.1 in GUI ,,,

View 1 Replies View Related

Cisco VPN :: 5512 Remote Desktop Through IPSec

Jan 22, 2013

I have a Cisco ASA 5512 device. I'm using both clientless SSL vpn. And also IPSEC which is used for our external users who connect using an IPAD and then a remote client to remote desktop into our terminal server.I created the connection using the IPSEC wizard in the ASDM software. Usually the connection works fine, but intermittently it fails to allow the user to connect using RDP.I'm able to initiate the VPN connection, and it says connected and can confirm the connection is up, however when trying to connect to the RDP server, it eventually times out. It was working fine most of the time as I say, however now I can't connect at-all.I've viewed the lgo as I try and connect and can see that my evice tries to initiate the connection, but can't quite figure out what it's trying to do. If I look at the connection in the monitoring page it says that its connected. But it's RX traffic has a value, but the TX value is 0.The interesting thing is, I can't connect, but at present have a user that is connected fine and working properly.

View 1 Replies View Related

Cisco VPN :: 5505 IPSec Remote VPN Connect But Cannot Do Anything

Apr 5, 2012

I just made a VPN on my ASA 5505 at home, I can connect successfully to it, but I can't contact anything in the network, nothing respond to ping or to anything else (include the ASA inside IP).

View 3 Replies View Related

Cisco VPN :: ASA5510 Remote Vpn Ipsec Not Working

Feb 29, 2012

I configured my cisco client with the info from the vpn wizard and get the following error :
 
error in the cisco vpn client when enabling the log : Invalid SPI size (log) + reason 412 the remote peer is no longer responding (application) message I see via the ASDM-IDM : Built inbound UDP connection for interface WAN
  
I'll explain briefly what I'm trying to do here :
 
* Remote vpn with windows users having cisco clients
* Group authentication and in the asa5510 LOCAL authentication
 
My WAN interface contains a public ip/29 I also defined a LAN interface with security level 100 in 10.0.60.0 255.255.252.0 range the vpn dhcp range I want to attribute to vpn users : 10.0.69.0/24
 
Basically I want users to initiate the vpn tunnel to the public IP and be able only to access the LAN range with the 10.0.60.0/22 range
 
ASA Version 8.2(5)
!
hostname xxxx
domain-name xxxx

[Code].....

View 7 Replies View Related

Cisco VPN :: Does AnyConnect 3.0 Support IPSec Remote-access VPN

Jul 12, 2011

I've read on Cisco AnyConnect 3.0 Q&A that it supports IPSec remote-access VPN: url...I've downloaded and installed AnyConnect 3.0.0629 Secure Mobility Client, but I'm not able to get IPSec VPN working. There's also no option to use PCF files from the previous Cisco IPSec VPN client. How to get IPSec VPN working on AnyConnect 3.0?

View 2 Replies View Related

Cisco VPN :: ASA 8.4 / IPsec Remote VPNs Got IP And Doesn't Work

Oct 12, 2012

I am setting up a simple remote IPsec VPN with a ASA 8.4. All I want to do is the remote user can VPN into the ASA, from there, he can browse the outside Web pages in the internet. and we'd like not to use split-tunneling. The outside infterface is 192.168.1.155/24, which is inside our network and this subnet works fine to outside. The pool for vpn is 192.168.0.0./24 (please pay attention to the 3r octet)

I configured and the remote user can vpn in and get an IP from the pool. but it seems that he cannot do anything. he cannot ping anything.I suspected the NATTing that i use. What is configured wrong? What traffic need to be natted and what need not.
 
======:ASA Version 8.4(2) !
!interface GigabitEthernet0description VPN interfacenameif outsidesecurity-level 0ip address 192.168.1.156 255.255.255.0 !interface GigabitEthernet1description VPN interfacenameif insidesecurity-level 100ip address 192.168.0.1 255.255.255.0
!ftp mode passiveobject network obj-192.168.0.0subnet 192.168.0.0 255.255.255.0object network obj-192.168.1.155host 192.168.1.155access-list EXTERNAL extended permit ip any any access-list EXTERNAL extended permit icmp any any access-list vpn extended permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0 pager lines 24mtu outside 1500mtu inside 1500ip local pool testpool 192.168.0.10-192.168.0.15ip verify reverse-path interface outsideicmp unreachable rate-limit 1 burst-size 1icmp permit any outsideicmp permit any insideno asdm history enablearp timeout

[code]....

View 17 Replies View Related

Cisco Routers :: SRP541W Remote Web Access Over IPSEC VPN?

May 9, 2012

I'm running FW 1.2.4 and how to setup Remote Web Access over my IPSEC vpn tunnel.  I would like to be able to remotely access these routers and make configuration changes from my main office but I cannot seem to figure out how to get it to work.  If I try to access the internal router IP from across the VPN, I cannot.  My VPN tunnel is up and operational and I can ping various devices across the tunnel but I cannot access the web management of the router.

View 4 Replies View Related

Cisco WAN :: Configuring Remote Access IPSEC VPN In IOS Router 12.4T

Apr 20, 2011

I am configuring Remote Access IPSEC VPN in IOS Router 12.4T.I am able to establish IPSEC VPN from VPN Client 4.0. But I am able to access all the LAN machines from this client connected.I want to restrict access to only one server in my LAN rather than accessing all the servers in Datacenter.For example
 
-Group FTP should be able to access only FTP Server with ip addess 10.1.1.21 on Port 21
-Group WEB should be able to access only WEB Server with ip address 10.1.1.80 on Port 80

View 11 Replies View Related

Cisco VPN :: Remote IPSec VPN - Windows 7 Client And ASA 5505?

Dec 20, 2011

I have difficulties with configuring Remote IPSec VPN with Cisco ASA 5505 and Windows 7 native VPN client. My client PC gets VPN pool IP address, and can access remote network behind ASA, but then I lose my internet connectivity. I have read that this should be an issue with split tunneling, but I did as it is told here and no luck.On Windows VPN Client settings, if I uncheck "use default gateway on remote network" I have internet connectivity (since client is using local gateway), but then, I cannot ping remote network.In log, I see this warnings of this type:Teardown TCP connection 256 for outside:192.168.150.1/49562 to outside:213.199.181.90/80 duration 0:00:00 bytes 0 Flow is a loopback (cisco)I have attached my configuration file (without split-tunneling configuration I tried). If you need additional logs I'll send them right away.

View 4 Replies View Related

Cisco VPN :: Set Up Remote Access IPsec VPN On Pair Of ASA 5540

Feb 6, 2011

I'm trying to set up remote access IPsec VPN on a pair of ASA 5540 without much success. I can connect with a client on the outside, and when I try to ping something on the inside I can see the ping requests reach the target but the answers don't come back to the VPN client. I've tried with different NAT rules without success.

View 3 Replies View Related

Cisco VPN :: ASA5520 - IPSec L2L VPN Remote Peer Is Being Denied

Mar 18, 2012

We are trying to add an additional LAN-to-LAN IPsec VPN to our network.  We currently have one remote office connected, when we configure the second VPN matching the first the tunnel never begins to establish.  There is an ACL that is dening the static IP for our remote office.
 
The layout is as follows:
 
Main office = ASA 5520
Remote Office A = ASA (Unknown Model)
Remote Office B = Adtran Router
 
All devices have static IP addresses.
 
We used the ASDM VPN wizard to create both VPN's.
 
We have created a rule allowing all traffic from our remote office IP, and that had no effect on the VPN aside from eliminating the following message from our logging:
 
4          Mar 19 2012          15:18:01          106023          67.50.19.230          50234          TWT-hq-e          31326          Deny udp src TWT-outside:67.50.19.230/50234 dst inside:TWT-hq-e/31326 by access-group "outside-in" [0x0, 0x0]
 
We have verified that both sides are configured the same however the VPN never is initiated so as of right now the ASA is simply blocking all attempts from our remote office to connect.

View 1 Replies View Related

Cisco VPN :: Configure Remote Vpn Ipsec Tunnel On 800 Router?

Mar 19, 2012

how can you configure remote vpn ipsec tunnel on a Cisco 800 router?

View 12 Replies View Related

Cisco VPN :: 5505 IPSec VPN Remote Peer Address

Mar 5, 2013

I've been using an ASA 5505 -- ASA 9.1(1) -- with an IPSec Remote Access VPN. Everything works properly, though I recently noticed that when my IPSec session is disconnected, I get the standard message ID 113019, but within that message the Peer IP address is incorrect. In fact, it isn't even close to my actual remote address. [code]
 
When I first researched the IP, I found it coming from China, which freaked me out. I changed settings, rolled back to 9.0(1), and nothing worked. Finally I rebooted, reconnected the VPN, and the IP changed. This time it was an address from RIPE NIC. I rebooted again, now an address from ARIN in the USA. One more reboot, now a random Comcast residential address.
 
Within that boot cycle, the peer address always stays the same. I've connected from different devices, different IPs, different ISPs - nothing matters. Additionally, there are no firewall logs for these IP addresses at all.
 
ASA Remote Access VPN peer addresses in disconnect message are incorrect and change at reboot.

View 3 Replies View Related

Cisco VPN :: ASA 5520 - IPSec Remote Access VPN Design

Mar 7, 2011

Is there any documents that I can use to design an IPSEC remote access solution using 2 data centers . One data center is primary and other one is secondary. The VPN is terminated in ASA 5520. End users using cisco client.

View 6 Replies View Related

Cisco VPN :: Remote Site Redundancy IPSEC Between 2911 And ASA

Nov 11, 2012

We already have IPSEC VPN connectivity established between sites but would like to introduce some resilience/redundancy at a remote site.
 
Site A has an ASA with one internet circuit.
 
Site B has a Cisco 2911 with one internet circuit and we have established site-to-site IPSEC VPN connectivity between the 2911 and the ASA.
 
Prior to getting the new internet circuit, Site B had a Cisco 877 with an ADSL line which are still available but aren’t currently in use.
 
The internet circuit at Site B has dropped a few times recently so we would like to make use of the ADSL circuit (and potentially the 877 router too) as a backup.
 
We thought about running HSRP between the 877 and 2911 routers at Site B and, in the event of a failure of the router or internet circuit, traffic would failover to the 877 and ADSL.
 
However, how would Site A detect the failure? Can we simply rely on Dead Peer Detection and list the public IP address of the internet circuit at Site B first with the public IP address used on the ADSL line second in the list on the ASA? What would happen in a failover scenario and, just as important, when service was restored – I’m not sure DPD would handle that aspect correctly?
 
I’ve read briefly elsewhere that GRE might be best to use in this scenario – but I can’t use GRE on the ASA. I have an L3 switch behind the ASA which I may be able to make use of? But I don’t want to disrupt the existing IPSEC VPN connectivity already established between the ASA and the 2911.   Can I keep IPSEC between the ASA and 2911 but then run GRE between the L3 switch and the 2911? If so, how would this best be achieved?  And how could I also introduce the 877 and ADSL line into things to achieve the neccessary redundancy?

View 6 Replies View Related

Cisco VPN :: ASA 5510 - Group Policy In IPSEC Remote?

Nov 20, 2012

I have configured ASA 5510 With IPsec Remote VPN.With local database users(Users are created in ASA).
 
Internal network has 4 VLANS. Need solution for below.
 
There are 25 Users created in ASA. where only 5 tp 6 users wants to grant access to Particualr IP and Subnets and rest of the users can access entire lan.
 
Is it possible to configure Group policy in ASA for IPsec Remote VPN.

View 1 Replies View Related

Cisco VPN :: 5520 / IPSec VPN Won't Initiate From Remote Site

Sep 8, 2012

I have a site-to-site VPN configured between a 5520 at our data center, and a 1700 at a client's site for site-to-site connectivity.  What I've noticed is, is that the VPN can only initiate from my Data Center, never from the client router.  I can telnet into the router and start a telnet session sourced from the "inside" interface and it fails, yet I can see the NAT translations get created in the state table that should match the crypto-map.  However, if I ping a host on the inside of the remote LAN from my workstation (behind the 5520) to bring the tunnel up, and run the exact same command on the client router once the tunnel is up, it works.  Right now I have a continuous ping running from my workstation to keep the tunnel up, but obviously that's not the best solution
 
I had to modify this config to NAT the LAN addresses at the client to a non-overlapping subnet, so anything coming from 128.1.0.0/16 should be NAT'd to 192.168.105.[50-200]/24.  I've also got two static NATs for inbound access from the data center and those seem to work fine.
 
Current configuration : 2787 bytes
!
! No configuration change since last restart
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption

[code]...

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved