Easy VPN Client on ASA5505 to Easy VPN Server on 1800 router help?
I've got an ASA5505 which I'm trying to setup as a mobile hardware vpn client for sales guys to take with them when they travel. So, they'd plug this ASA5505 into their hotel internet feed, and it would VPN back to the main site without any site specific configuration needed.
On the ASA5505 outside, it's set for DHCP, the inside of the ASA is set for 192.168.101.x.
I've tried both client and network extension mode, and in both, the VPN light comes on the ASA to show it's connected, but from any client connected to the LAN of this ASA, they can't ping resources at the head site. Internet connectivity behind this ASA works fine. Software based remote access VPN clients to the main site work fine and can ping the same resources this hardware client is trying to. Can anyone provide some documents details how to setup the IOS Easy VPN Server...as I think my client configuration is correct;
vpnclient server 2xx.x.xxx.xxx
vpnclient mode client-mode
vpnclient vpngroup WMLVPN password ********
vpnclient username remote1 password ********
Is there something I'm missing? Or something funny between an ASA and IOS? I have no problem setting up software clients, or static site to site VPN tunnels, but this is my first hardware client and I'm totally stumped. I've tried messing around with the nat exemption list on the head end, denying NAT on the traffic destined for both the actual remote LAN (192.168.101.x) and the VPN pool given address...which I think is where my problem is...
Re: Easy VPN Client on ASA5505 to Easy VPN Server on 1800 router
Would you perhaps have a sample config yourself...the headend router is quite a configuration with many vpn tunnels and clients...so it would be a huge pain to clean up for posting, and hard for you to follow. It might be easier if you can point me towards an example if one exists. If not, perhaps you can help me off the forums. Let me know how you can help. Thanks.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :