cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1967
Views
0
Helpful
23
Replies

pix 501 vpn problem

verstand76
Level 1
Level 1

I can connect but don't see any network resources.

The Vpn Client, ver:5.0.01, is running on an xp machine.

The network it is connecting to is behind a pix501- Ver. 6.3(5).

When the connection is made the remote client gets an assigned address from the vpn pool 192.168.2.10- 192.168.2.25:

The vpn client log shows:

Line:45 18:07:27.898 08/12/09 Sev=Info/4 CM/0x63100034

The Virtual Adapter was enabled:

IP=192.168.2.10/255.255.255.0

DNS=0.0.0.0,0.0.0.0

WINS=0.0.0.0,0.0.0.0

Domain=

Split DNS Names=

This is followed by these lines:

46 18:07:27.968 08/12/09 Sev=Warning/2 CVPND/0xE3400013

AddRoute failed to add a route: code 87

Destination 192.168.1.255

Netmask 255.255.255.255

Gateway 192.168.2.1

Interface 192.168.2.10

47 18:07:27.968 08/12/09 Sev=Warning/2 CM/0xA3100024

Unable to add route. Network: c0a801ff, Netmask: ffffffff, Interface: c0a8020a, Gateway: c0a80201.

48 18:07:28.178 08/12/09 Sev=Info/4 CM/0x63100038

Successfully saved route changes to file.

49 18:07:28.198 08/12/09 Sev=Info/6 CM/0x63100036

The routing table was updated for the Virtual Adapter

50 18:07:29.760 08/12/09 Sev=Info/4 CM/0x6310001A

One secure connection established

* ...

I can ping, from the remote client, to an inside ip behind the pix even

when I get the "add route failure" shown above, but i can't ping the computer name.

I enabled NAT traversal using the PDM, But when I connect with this option I get the error that the "Remote end is NOT behind a NAT device This end IS behind a NAT device" and ping fails.

Behind the pix are a few computers with no central server so I'm not passing a WINS server to the remote client.

I set up the vpn with the wizard.

Attached is the config file.

Any suggestions would be appreciated.

Regards,

Hugh

1 Accepted Solution

Accepted Solutions

Hugh, sure you can rate based on the overall of the conversation but you are not obligated to do so but certainly would be nice to provide ratings.

To summarized the overall narrowing down possible issues, the main goal was to ensure RA VPN configuration on the PIX501 was corrected.

1- We enabled NAT-T on the firewall - even though this was not the issue but it is required to have it there should you RA VPN from other locations - NAT travseral makes the firewall aware of NAT devices from other ends - here is some good information on NAT-T for reference in future

http://www.microsoft.com/technet/community/columns/cableguy/cg0802.mspx

2-We corrected the VPN POOL network /28 as well as the nonat access list and crypto acl to be consistant.

Here is a link for future reference with numerous PIX configuration scenarios

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html

lastly - your only remaining issue we can say is purely isolated with MAC machine and vpn client software.

You could perhaps try different version of the client in the MAC, or also look into release notes open caveats to rule out cisco cleint versioning and MAC versioning if there is any issues.

http://www.cisco.com/en/US/products/sw/secursw/ps2308/prod_release_notes_list.html

Regards

Jorge Rodriguez

View solution in original post

23 Replies 23

JORGE RODRIGUEZ
Level 10
Level 10

Add to your config NAT-T and try again

pix(config)#isakmp nat-traversal

http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml#Solution1

Regards

Jorge Rodriguez

I did try : isakmp nat-traversal but got the error I noted in my post. I even couldn't ping then. I'll try again. Do I need to add any seconds or just leave blank?

Could you correct your vpn pool to be consistant with your nonat exempt rule prior to troubleshooting fruther.

you have /28 pool network, that gives 14 hosts and range should start at host .1 to .14 , your config have ip local pool vpp1 192.168.2.10-192.168.2.25

your vpn pool shoudl be:

ip local pool vpp1 192.168.2.1-192.168.2.14

as for the NAT-T the 20 is default so automatically will be added.

[edit]

after you correct vpn pool network range try vpn client and access resources in the 192.168.1.0/24 network.

Post results

Jorge Rodriguez

ok, I'll will change the pool.

I just tried the nat-t but still nothing to "see". I was able to ping inside though, so I must of had some other config setting when ping failed.

I'm still getting the "add route failure" in the client log; is this significant?

the client log shows connected and continues with line after line of

"Sent a keepalive on the IPSec SA"

I'll post new results after pool change.

Thanks,

hugh

Hugh, correct the pool first and try again.

Jorge Rodriguez

ok, i'm on my way to try the new pool.

hugh

I changed the pool. Still can't see computer behind pix.

The ipconfig shows for cisco adapter an ip of 192.168.2.1 but has no default gateway.

In Route Details window: Local LAN routes is empty and Secured routes has 192.168.1.0 255.255.255.0

bytes sent and received show some in the client statistics but if i check the cisco vpn network via network connections it shows 0 bytes sent and received.

VDP port 4500 and says local lan disabled ; i don't understand this as I have 'allow local lan access' checked in the client set up.

I'm still getting the "add route failure"

hugh

Hugh, ok you corrected the vpn pool, looking at the config seems to be ok split tunnle alcl etc.. which makes me think perhaps vpn client itself or machine, have you tried different version of vpn client , or even from a different machine.

post again an updated config for a second look .

Regards

Jorge Rodriguez

Yes, I've tried client ver. 4.9.61 on a Mac OS X 10.5.7; it connects but I see nothing, nor can I ping.

I have cisco vpn client 5.0.00.0340 which I can try from windows. What do you think?

The windows os I've tried so far is xp home service pack 2 with cisco client 5.0.01 as noted in first post.

I can try from another windows os xp home service pack 3.

attached is latest config

thanks for working on this

Hugh

Sorry..I did not notice the crypto acl is incorrect , change it to be /28, you have it with a /27.

remove this:

no access-list outside_cryptomap_dyn_20 permit ip any 192.168.2.0 255.255.255.224

replace with:

permit ip any 192.168.2.0 255.255.255.224

access-list outside_cryptomap_dyn_20 permit ip any 192.168.2.0 255.255.255.240

post if still issue.

Jorge Rodriguez

ok, i need to get this clear:

you mean replace the line:

access-list outside_cryptomap_dyn_20 permit ip any 192.168.2.0 255.255.255.224

with this line:

access-list outside_cryptomap_dyn_20 permit ip any 192.168.2.0 255.255.255.240

hugh

Yes Hugh, I placed the no in the line.

no access-list outside_cryptomap_dyn_20 permit ip any 192.168.2.0 255.255.255.224

and add to your config

access-list outside_cryptomap_dyn_20 permit ip any 192.168.2.0 255.255.255.240

we just need to make config clear and consistant to rule out vpn config discrepancies in your issue.

Regards

Jorge Rodriguez

yes, I see that the 'no' is part of the command. It did remove the line. I'm about to test now.

I noticed in viewing configuration settings through the PDM that under VPN/IPSec Rules in the Remote Side panel (detail view) should both be 192.168.2.0/28 ?

After I changed access-list outside using the command line tool, this panel had 192.168.2.0/28 but below it was 192.168.2.0/27.

I changed this /27 via Edit and saved. an error message came up but it now shows both as 192.168.2.0/28.

I presume this is correct.

hugh

Yes, try testing again.. after that crypto acl correction at least the vpn config is consistant and narrow down troubleshooting effort.

Make also sure that hosts behind the PIX the 192.168.1.0 network don't have any firewalls turned on so that vpn pool network can ping those hosts by ip.

Jorge Rodriguez
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card