Setup is as follows
Clients PC on Win 7 PPTP connection to a Public IP -----> Cisco 1841 onsite---->Internet
Client gets error 619. Now, client does have a site to site vpn configured on router to connect to a different customer and thats working fine.
When we dial pptp connection using windows 7, on cisco router I get
%CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd packet not an IPSEC packet.
(ip) vrf/dest_addr= /<Router's Wan IP>, src_addr= <Public IP of destination>, prot= 47
Destination in question is not cisco and doesnt use ipsec. It works if i use my wifi 3g card so destination is not an issue
Win7 Firewall is disabled (FYI)
description SHDSL Primary Dialer
ip address negotiated
ip nat outside
ip nat enable
dialer pool 1
dialer idle-timeout 2147483
no cdp enable
ppp authentication chap pap callin
ppp chap hostname ...
ppp chap password ...
crypto map VPN
ip nat source list 100 interface Dialer0 overload
access-list 100 deny ip 192.168.0.0 0.0.0.255 host <Wan IP of different customer>
access-list 100 permit ip 192.168.0.0 0.0.0.255 any
access-list 100 permit gre any any
access-list 100 permit tcp any any eq 1723
access-list 120 permit ip 192.168.0.0 0.0.0.255 host <Wan IP of different customer>
crypto isakmp policy 1
crypto isakmp policy 10
crypto isakmp policy 20
crypto isakmp key sharedkey address <Wan IP of different customer>
crypto ipsec transform-set Pactolus-cc esp-3des esp-sha-hmac
crypto map VPN 20 ipsec-isakmp
set peer <Wan IP of different customer>
set transform-set Pactolus-cc
set pfs group2
match address 120
Since acl 120 is precisely for a source destination, I should be able to receive non ipsec packets on device.
Any clue/suggestions appreciated.