<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 1841 vpn client in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770327#M1021220</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try to add "reverse-route" under the dynamic crypto map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But everything else looks ok, verify that the crypto map is applied with "sh crypto dynamic-map".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A debug crypto isakmp should show when it tries to connect, either you have not configured logging properly, or the client can not reach the router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 28 Jul 2007 07:17:57 GMT</pubDate>
    <dc:creator>mattiaseriksson</dc:creator>
    <dc:date>2007-07-28T07:17:57Z</dc:date>
    <item>
      <title>1841 vpn client</title>
      <link>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770326#M1021219</link>
      <description>&lt;P&gt;I have an 1841 that has a working site to site vpn tunnel....I added the config for a vpn client and nothing happens&lt;/P&gt;&lt;P&gt;I debugged crypto isakmp and dont even see the client trying to connect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyone see wants wrong &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip inspect name test http urlfilter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username xxxxxx privilege 15 password 7 xxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 11&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key ciscociscoAZ address x.x.x.x no-xauth&lt;/P&gt;&lt;P&gt;crypto isakmp keepalive 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group Remote_User&lt;/P&gt;&lt;P&gt; key cisco&lt;/P&gt;&lt;P&gt; pool VPNpool&lt;/P&gt;&lt;P&gt; acl 150&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set remotesite esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10&lt;/P&gt;&lt;P&gt; set transform-set myset&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map mymap client authentication list userauthen&lt;/P&gt;&lt;P&gt;crypto map mymap isakmp authorization list groupauthor&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap 11 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer x.x.x.x&lt;/P&gt;&lt;P&gt; set transform-set remotesite&lt;/P&gt;&lt;P&gt; match address vpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 192.168.12.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip inspect test in&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map mymap&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool VPNpool 192.168.50.50 192.168.50.160&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 x.x.x.x&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip nat inside source list NoNat interface FastEthernet0/1 overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended NoNat&lt;/P&gt;&lt;P&gt; deny   ip 192.168.12.0 0.0.0.255 192.168.9.0 0.0.0.255&lt;/P&gt;&lt;P&gt; deny   ip 192.168.12.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt; deny   ip 192.168.12.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;/P&gt;&lt;P&gt; permit ip 192.168.12.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;ip access-list extended vpn&lt;/P&gt;&lt;P&gt; permit ip 192.168.12.0 0.0.0.255 host 10.155.102.252&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 150 permit ip 192.168.12.0 0.0.0.255 192.168.50.0 0.0.0.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770326#M1021219</guid>
      <dc:creator>columoconnor</dc:creator>
      <dc:date>2019-03-11T10:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: 1841 vpn client</title>
      <link>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770327#M1021220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try to add "reverse-route" under the dynamic crypto map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But everything else looks ok, verify that the crypto map is applied with "sh crypto dynamic-map".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A debug crypto isakmp should show when it tries to connect, either you have not configured logging properly, or the client can not reach the router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2007 07:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770327#M1021220</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-28T07:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: 1841 vpn client</title>
      <link>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770328#M1021221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mattias&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the reverse route didnt work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I debug crypto isakmp I dont even see it trying....but I can ping outside interface from where I'm trying the client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router#sh cry dynamic-map&lt;/P&gt;&lt;P&gt;Crypto Map Template"dynmap" 10&lt;/P&gt;&lt;P&gt;        No matching address list set.&lt;/P&gt;&lt;P&gt;        Security association lifetime: 4608000 kilobytes/3600 seconds&lt;/P&gt;&lt;P&gt;        PFS (Y/N): N&lt;/P&gt;&lt;P&gt;        Transform sets={&lt;/P&gt;&lt;P&gt;                myset,&lt;/P&gt;&lt;P&gt;        }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does this tell you anything&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Colum&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2007 12:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770328#M1021221</guid>
      <dc:creator>columoconnor</dc:creator>
      <dc:date>2007-07-30T12:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: 1841 vpn client</title>
      <link>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770329#M1021222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, you are referring to the aaa groups userauthen and groupauthor but they are not defined anywhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map mymap client authentication list userauthen&lt;/P&gt;&lt;P&gt;crypto map mymap isakmp authorization list groupauthor &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login userauthen local&lt;/P&gt;&lt;P&gt;aaa authorization network groupauthor local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to use xauth with local authentication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2007 13:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770329#M1021222</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-30T13:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: 1841 vpn client</title>
      <link>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770330#M1021223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right ...that was missing but still doesnt work...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;its weird...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;813    11:11:24.307  07/30/07  Sev=Info/4	IKE/0x63000017&lt;/P&gt;&lt;P&gt;Marking IKE SA for deletion  (I_Cookie=CFDA79CF5F04F509 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;814    11:11:24.828  07/30/07  Sev=Info/4	IKE/0x6300004B&lt;/P&gt;&lt;P&gt;Discarding IKE SA negotiation (I_Cookie=CFDA79CF5F04F509 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;its like it cant get to the outside IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could it be the inspect/websense&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2007 14:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770330#M1021223</guid>
      <dc:creator>columoconnor</dc:creator>
      <dc:date>2007-07-30T14:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: 1841 vpn client</title>
      <link>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770331#M1021224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer below document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which will guide you step by step procedure to configure client VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As well as it also showing Troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is well easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/routers/ps274/products_configuration_example09186a0080819289.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/routers/ps274/products_configuration_example09186a0080819289.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dharmesh Purohit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2007 14:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/1841-vpn-client/m-p/770331#M1021224</guid>
      <dc:creator>purohit_810</dc:creator>
      <dc:date>2007-07-30T14:32:35Z</dc:date>
    </item>
  </channel>
</rss>

