Many of our telecommuters use a Lucent/Avaya product called IP Softphone. This software is a poor man's VoIP in that it allows for redirection of calls from the local office PBX to your home phone and allows you to dial-out from your house as if you were in the office. Since converting to the Cisco VPN we have lost the ability to communicate with this software/PBX. Best I can tell the packets sent from the local machine are embedded with the ISP given IP address rather then VPN given, so the PBX is unable to talk with the local computer. We just converted from a Nortel VPN which seemed to overwrite your local computer network settings with the VPN given IP address etc. while connected. Is there any way to do this with the cisco or at least be able to fool the PBX??
i doubt this has anything to do with the cisco vpn, from which i have done similar applications.. i believe you may have to check how your internal network is setup, and whether the routes are all inplace @ the pbx..
can the pbx speak to the ip addresses used by your clients while on the VPN ? can you have you pbx vendor ping the clients IP addresses while the are on the VPN..
do you have a router (or firewall) filtering some ports/protocols behind the vpn concentrator ?
perhaps the pbx is receiving traffic from the vpn clients, but since it has no routes to them, the packets are getting dropped ?
I would set up a sniffer and monitor what is being sent to and from the pbx's connection to the internal network to determine where the traffic is failing..
what is the routing structure on the pbx ? does it have a default route towards the internal interface ip address of the vpn concentrator, or does it have a default route to another router or firewall, and then routes for the vpn pool ip addresses used by clients when they connect ?
Go get the latest Lucent IP Softphone software and on the client you would be able to specify the internal ip address the vpn client received. The latest Avaya client would have the advanced tab to put in the ip address.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :