<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN3 client fails to connect to PIX at Phase 1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50381#M712490</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need the following access-lists:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any host 193.x.y.29 &lt;/P&gt;&lt;P&gt;access-list 100 permit udp any host 193.x.y.29 eq isakmp &lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 193.x.y.29 eq 50 &lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 193.x.y.29 eq 51 &lt;/P&gt;&lt;P&gt;access-list 90 permit udp any host 193.x.y.29 eq isakmp&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 193.x.y.29 eq 50 &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 193.x.y.29 eq 51 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You only need this one:&lt;/P&gt;&lt;P&gt;access-list 90 permit ip 172.x.y.0 255.255.255.0 10.1.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are not keeping it from working but let's try to clean up a bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything looks right otherwise.  Can you get those debugs?  They are the best way of troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also how is the client PC connected to the Internet?  That might also help to know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Nov 2001 19:11:39 GMT</pubDate>
    <dc:creator>pdentico</dc:creator>
    <dc:date>2001-11-20T19:11:39Z</dc:date>
    <item>
      <title>VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50370#M712479</link>
      <description>&lt;P&gt;My VPN client 3.0.1 does not even connect to the PIX506 v6.0(1) at Phase 1. The client log shows:&lt;/P&gt;&lt;P&gt;SENDING&amp;gt;&amp;gt;&amp;gt;ISAKMP OAK AG(SA, KE, NON, ID, VID, VID, VID) to 193.130.x.y (i.e. PIX outside)&lt;/P&gt;&lt;P&gt;It tries 3 retransmissions, then says:&lt;/P&gt;&lt;P&gt;Exceeded 3 IKE SA negotiation retransmits... peer is not responding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX log shows nothing. But before I added an access list to pass ip it showed:&lt;/P&gt;&lt;P&gt;Deny udp src outside:62.x.y.z/500 dst inside:193.130.y.z/500 by access-group "100" so obviously it is reaching the PIX. (62.x.y.z is not the outside interface address; it must be the ISP address as it changes if I try when connected to a different ISP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have followed all guidelines, isakmp policies, etc. and have isakmp key ????? address 0.0.0.0 netmask 0.0.0.0 with matching key in VPN3 client group access information on Authentication tab, have a vpngroup set up with matching name, have an address-pool set with isakmp client configuration address-pool local &amp;lt;poolname&amp;gt; outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX is working for users inside to get to Internet, and is passing SMTP mail, it also passes &lt;A class="jive-link-custom" href="http://www.grc.com" target="_blank"&gt;www.grc.com&lt;/A&gt; security tests OK.&lt;/P&gt;&lt;P&gt;I have tried "Allow IPSec through NAT mode" both on and off on client settings, but no differnce.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone please enlighten me on what PIX statements are related to failures at this stage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(I'm sure that I'll have fun and games before it all works, but we need to solve this Phase 1 stage first.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael Burnford&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:54:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50370#M712479</guid>
      <dc:creator>mburnford</dc:creator>
      <dc:date>2020-02-21T05:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50371#M712480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you got the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the configuration ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rhodri&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2001 16:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50371#M712480</guid>
      <dc:creator>rjphillips</dc:creator>
      <dc:date>2001-11-13T16:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50372#M712481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that one is there...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2001 17:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50372#M712481</guid>
      <dc:creator>mburnford</dc:creator>
      <dc:date>2001-11-13T17:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50373#M712482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Further, I can ping the PIX outside interface and the PIX ICMP trace shows "Inbound ICMP echo request (len 32 ....etc) isp_address &amp;gt; PIX_outside_address &amp;gt; network_server_address" followed by "Outbound echo reply (len ...etc) server &amp;gt; PIX &amp;gt; ISP" so I presume that is all working.&lt;/P&gt;&lt;P&gt;However when I try the VPN3 client the trace gives just "Outbound ICMP unreachable (code 3) server_address &amp;gt; PIX_outside_address &amp;gt; ISP_address" messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this mean the client is getting to the server but the reply is not getting through? What PIX command line will correct this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2001 18:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50373#M712482</guid>
      <dc:creator>mburnford</dc:creator>
      <dc:date>2001-11-13T18:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50374#M712483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is your client behind any sort of firewall??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2001 18:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50374#M712483</guid>
      <dc:creator>pdentico</dc:creator>
      <dc:date>2001-11-13T18:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50375#M712484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No firewall at the client end. I have tried the client with connections to 3 different ISPs including Compuserve to see if the ISP has something funny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a ping replies but the VPN3 client connection does not reply, what is the difference? Both are ICMP are they not? What PIX command handles this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2001 09:48:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50375#M712484</guid>
      <dc:creator>mburnford</dc:creator>
      <dc:date>2001-11-14T09:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50376#M712485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the reference to GRC.com I'm guessing you have an outbound access-list on the outside interface. This may be blocking the outbound ICMP (this is just a guess, no config info so difficult to tell). Is anything showing as being blocked in the PIX logs when you ping from VPN3 client ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as for VPN client, the following generic config works fine with 3.X clients, check it against yours I guess (IP's and passwords changed,obviously)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool ippool 192.168.0.1-192.168.0.10&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPDNDES esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 50 set transform-set VPDNDES&lt;/P&gt;&lt;P&gt;crypto map mapName 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mapName interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup myVpnGroup address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup myVpnGroup idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup myVpnGroup password cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rhodri&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2001 10:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50376#M712485</guid>
      <dc:creator>rjphillips</dc:creator>
      <dc:date>2001-11-14T10:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50377#M712486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check you have the following statement in the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit ipsec-isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow valid ipsec traffic to bypass ACL's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, vpn3.x doesn't require the wildcard isakmp key statement. It is authenticated through the group statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compare with the following sample:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/warp/public/110/pix3000.html" target="_blank"&gt;http://cisco.com/warp/public/110/pix3000.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2001 12:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50377#M712486</guid>
      <dc:creator>turnbull</dc:creator>
      <dc:date>2001-11-14T12:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50378#M712487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What are the debugs from the pix.&lt;/P&gt;&lt;P&gt;I usually use "debug crypto ipsec" and "debug crypto isakmp"&lt;/P&gt;&lt;P&gt;They may prove to useful.  Also, can you provide a config to look at.(Cleaned up of course) &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2001 14:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50378#M712487</guid>
      <dc:creator>pdentico</dc:creator>
      <dc:date>2001-11-14T14:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50379#M712488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config seems OK from your info, but it still doesn't connect. The point at which it fails seems to be to do with the inside interface. I will put together a config and post it later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2001 16:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50379#M712488</guid>
      <dc:creator>mburnford</dc:creator>
      <dc:date>2001-11-14T16:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50380#M712489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK here is a config. I'm sure there s something simple I am missing...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.0(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is relevant commands for e-mail and Internet access (working well)&amp;#133;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 193.x.y.29 eq smtp &lt;/P&gt;&lt;P&gt;icmp permit any unreachable outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any time-exceeded outside&lt;/P&gt;&lt;P&gt;ip address outside 193.x.y.28 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 172.x.y.1 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 193.x.y.17-193.x.y.21&lt;/P&gt;&lt;P&gt;global (outside) 1 193.x.y.22&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 193.x.y.29 172.x.y.2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 193.x.y.30 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I have added for VPN3.0 clients to access system (doesn&amp;#146;t work)&amp;#133;&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 10.1.2.1-10.1.2.254&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 90&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set vpnset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 50 set transform-set vpnset&lt;/P&gt;&lt;P&gt;crypto map vpnmap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map vpnmap client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map vpnmap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup vpn3 address-pool vpnpool&lt;/P&gt;&lt;P&gt;vpngroup vpn3 default-domain &lt;MY domain="" name.co.uk=""&gt;&lt;/MY&gt;&lt;/P&gt;&lt;P&gt;vpngroup vpn3 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpn3 password ******** &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN3.0 clients are set up with group vpn3, with matching password and trying to connect to 193.x.y.29 (which is the only address that even responds at all). Although I can ping 193.x.y.29, when the VPN3 client tries it the icmp trace gives &amp;#147;Outbound ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 193.x.y.29 &amp;gt; 168.x.y.z&amp;#148;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that it doesn&amp;#146;t work because it cannot negotiate a connection. What access-list etc do I need to set up? I have tried all sorts of combinations of the following with no success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any host 193.x.y.29 &lt;/P&gt;&lt;P&gt;access-list 100 permit udp any host 193.x.y.29 eq isakmp &lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 193.x.y.29 eq 50 &lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 193.x.y.29 eq 51 &lt;/P&gt;&lt;P&gt;access-list 90 permit udp any host 193.x.y.29 eq isakmp &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 193.x.y.29 eq 50 &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 193.x.y.29 eq 51 &lt;/P&gt;&lt;P&gt;access-list 90 permit ip 172.x.y.0 255.255.255.0 10.1.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;#146;m a bit lost now &amp;#150; I thought VPN with Cisco would be quite straightforward.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2001 18:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50380#M712489</guid>
      <dc:creator>mburnford</dc:creator>
      <dc:date>2001-11-20T18:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50381#M712490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need the following access-lists:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any host 193.x.y.29 &lt;/P&gt;&lt;P&gt;access-list 100 permit udp any host 193.x.y.29 eq isakmp &lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 193.x.y.29 eq 50 &lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 193.x.y.29 eq 51 &lt;/P&gt;&lt;P&gt;access-list 90 permit udp any host 193.x.y.29 eq isakmp&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 193.x.y.29 eq 50 &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 193.x.y.29 eq 51 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You only need this one:&lt;/P&gt;&lt;P&gt;access-list 90 permit ip 172.x.y.0 255.255.255.0 10.1.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are not keeping it from working but let's try to clean up a bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything looks right otherwise.  Can you get those debugs?  They are the best way of troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also how is the client PC connected to the Internet?  That might also help to know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2001 19:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50381#M712490</guid>
      <dc:creator>pdentico</dc:creator>
      <dc:date>2001-11-20T19:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50382#M712491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are debug traces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is when trying from the VPN3 client...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REAPER_TIMER&lt;/P&gt;&lt;P&gt;PEER_REAPER_TIMER5: ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 172.x.y.1&lt;/P&gt;&lt;P&gt;6: ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 172.x.y.1&lt;/P&gt;&lt;P&gt;7: ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 172.x.y.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...and simple pinging from the client computer...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PEER_REAPER_TIMER&lt;/P&gt;&lt;P&gt;PEER_REAPER_TIMER&lt;/P&gt;&lt;P&gt;PEER_REAPER_TIMER8: Inbound  ICMP echo request (len 32 id 5 seq 256) 62.x.y.135 &amp;gt; 193.x.y.29 &amp;gt; 172.x.y.2&lt;/P&gt;&lt;P&gt;9: ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 172.x.y.1&lt;/P&gt;&lt;P&gt;10: Inbound  ICMP echo request (len 32 id 5 seq 512) 62.x.y.135 &amp;gt; 193.x.y.29 &amp;gt; 172.x.y.2&lt;/P&gt;&lt;P&gt;11: ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 172.x.y.1&lt;/P&gt;&lt;P&gt;12: Inbound  ICMP echo request (len 32 id 5 seq 768) 62.x.y.135 &amp;gt; 193.x.y.29 &amp;gt; 172.x.y.2&lt;/P&gt;&lt;P&gt;13: ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 172.x.y.1&lt;/P&gt;&lt;P&gt;14: Inbound  ICMP echo request (len 32 id 5 seq 1024) 62.x.y.135 &amp;gt; 193.x.y.29 &amp;gt; 172.x.y.2&lt;/P&gt;&lt;P&gt;15: ICMP unreachable (code 3) 172.x.y.2 &amp;gt; 172.x.y.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PEER_REAPER_TIMER&lt;/P&gt;&lt;P&gt;PEER_REAPER_TIMER&lt;/P&gt;&lt;P&gt;PEER_REAPER_TIMER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.x.y.1 is the PIX inside interface, 172.x.y.2 is the NIC in the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client is Win2000Pro with dial-up to ISP. I have tried different ISP including Compuserve. I connect to the ISP then run the VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing I notice is that the outside of the PIX is connected to a Cisco 2500 router provided by the ISP (UUNET) which connects to the 64k kilostream line. When talking about IKE mode config the Cisco documentation says the router needs to permit IKE Mode Config, and that version of router does not allow this. However, they tell me that as the router is doing nothing more than passing it all through, this is irrelevant. What does it all mean?&lt;/P&gt;&lt;P&gt;The ISP has opened ports/protocols 500, 50 and 51.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2001 19:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50382#M712491</guid>
      <dc:creator>mburnford</dc:creator>
      <dc:date>2001-11-22T19:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN3 client fails to connect to PIX at Phase 1</title>
      <link>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50383#M712492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure you have the proper acl (extended acl):&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 110&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 172.x.y.0 255.255.255.0 10.1.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then capture the following debugs on the PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug crypto isakmp&lt;/P&gt;&lt;P&gt;debug crypto engine&lt;/P&gt;&lt;P&gt;debug crypto ipsec &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compare your config on the PIX and client from:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/customer/110/pix3000.html" target="_blank"&gt;http://www.cisco.com/warp/customer/110/pix3000.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you get the output of the debugs compare them on the one list on the sample as well.  It would tell you what is not matching on Phase 1.  I suspect that it is actually passing phase one but failing Phase 2 (IPSec).&lt;/P&gt;&lt;P&gt;From the client make sure you are trying to ping the 172.x address rather than the 193.x address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Dec 2001 03:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn3-client-fails-to-connect-to-pix-at-phase-1/m-p/50383#M712492</guid>
      <dc:creator>cjacinto</dc:creator>
      <dc:date>2001-12-08T03:14:08Z</dc:date>
    </item>
  </channel>
</rss>

