Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Community Member

GRE over IPSEC on PIX Remote Access VPN

Hi all,

I would need to build a GRE tunnel from a local IOS (pix inside lan) and a remote IOS (internet ezvpn client), through a PIX Remote Access VPN.

Is it possible?

The remote IOS gets a different wan ip address each time it connects to internet and the PIX assign it the address from an internal configured POOL.

Thanks in advance. Efrem

2 REPLIES
Silver

Re: GRE over IPSEC on PIX Remote Access VPN

You can refer this bug for more information on GRE tunnel:CSCse36327

Community Member

Re: GRE over IPSEC on PIX Remote Access VPN

Thank-you. That bug is exactly what happens to me; your hint increased my understanding of the problem, unfortunately, the bug solution do not solve it. Maybe it is drawed for lan-to-lan vpn. I run pix version 8.0.3 and I can write the command: "pix(config)#sysopt connection reclassify-vpn", but without effect.

What happen is: starting with all up and running (remote access vpn, gre tunnel and ospf), if the vpn drops, the local_gre machine continue to send gre pachets to the tunnel destination. Without vpn up, theese packets are erroneously translated out the outside interface by the pix and this continue also when the vpn return up. To work-around the problem, I stop theese pakets to time-out this wrong connection. Now, thanks to you, I learned also the command "pix#clear local-host" to drop the connection.

In my actual case I chosen another workaround: I added a static route to the pix to return back gre packets to inside. When the vpn is up, the pix assign the address to the remote ezvpn_client and ignore the static route.

I hope Cisco will extend the command "...reclassify-vpn" also to the remote access.

Bye. Efrem

123
Views
3
Helpful
2
Replies
CreatePlease to create content