I know it is possible and I am real close to having this right. What I am trying to do is use cisco vpn client 4.0 to a router with 12.2.15.t. All of the example are using a network to network vpn not a client to network vpn. The l,clients are on dial up so they have dynamic adddress assigned by their ISP.
The router is using nat and has static mapping. Outside users are natted to web servers inside, and we also have internal machines that get internet acess from this router. I know I have to have the vpn bypass the nat translation, but seem to be missing something. What am i missing to get this work. Thanks in advance.
service timestamps debug uptime
service timestamps log uptime
boot system flash c2600-ik9o3s3-mz.122-15.T.bin
logging queue-limit 100
enable secret xxxxxxxxxxxxxxx
username test1 password xxxxxxxxxxx
username test1 password xxxxxxxxxxxxxx
aaa authentication login userauthen local
aaa session-id common
ip name-server 10.10.90.6
ip audit notify log
ip audit po max-events 100
crypto isakmp policy 3
crypto isakmp client configuration group vpnclient
I noticed the fact that a local user account in the prerequisites for this solution, but are you saying that no external authentication server can be used for CIsco VPN client authentication - al all??!
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :