I can successfully establish a vpn connection using the cisco vpn client but i cannot access any resources on the remote site, nor can i ping anything. The device running the EASYVPN server is cisco 881.
I would i appreciate some help here.
crypto isakmp policy 1 encr 3des authentication pre-share group 2 ! crypto isakmp client configuration group GROUPVPN key Password1 dns 10.10.10.1 188.8.131.52 pool SDM_POOL_3 acl 100 crypto isakmp profile ciscocp-ike-profile-1 match identity group GROUPVPN client authentication list ciscocp_vpn_xauth_ml_3 isakmp authorization list ciscocp_vpn_group_ml_3 client configuration address respond virtual-template 1 ! ! crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac mode tunnel crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac mode tunnel crypto ipsec transform-set ESP-3DES-SHA2 esp-3des esp-sha-hmac mode tunnel ! crypto ipsec profile CiscoCP_Profile1 set transform-set ESP-3DES-SHA2 set isakmp-profile ciscocp-ike-profile-1
interface FastEthernet0 no ip address ! interface FastEthernet1 no ip address ! interface FastEthernet2 no ip address ! interface FastEthernet3 no ip address ! interface FastEthernet4 ip address dhcp ip nat outside ip virtual-reassembly in duplex auto speed auto ! interface Virtual-Template1 type tunnel ip unnumbered FastEthernet4 tunnel mode ipsec ipv4 tunnel protection ipsec profile CiscoCP_Profile1 ! interface Vlan1 ip address 10.10.10.1 255.255.255.0 ip nat inside ip virtual-reassembly in ! ip local pool SDM_POOL_3 10.10.20.10 10.10.20.20 ip forward-protocol nd ip http server no ip http secure-server ! ! ip nat inside source list 199 interface FastEthernet4 overload ip route 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx ! ! access-list 100 remark CCP_ACL Category=4 access-list 100 permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255 access-list 199 remark CCP_ACL Category=18 access-list 199 deny ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255 access-list 199 permit ip 10.10.10.0 0.0.0.255 any !
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...