<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Router - ISA 2004 VPN connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-router-isa-2004-vpn-connection/m-p/1269471#M949549</link>
    <description>&lt;P&gt;Hello there, I've recently connected a Cisco 871 router to a ISA 2004 server (site to site VPN). The connection details are listed in this Microsoft article: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://technet.microsoft.com/en-us/libr" target="_blank"&gt;http://technet.microsoft.com/en-us/libr&lt;/A&gt; ... 02442.aspx &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnel works, but it tends to disconnect once every week. Additionally we can't write backups to a server at the remote end (we only get a 1 kb file, the rest doesn't get transfered). The same goes for files that are sent by a scanner to the server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A article detailed that mismatched MTU values might be the cause of this. I've adapted the ISA to negotiate the MTU (by setting the EnablePMTUDiscovery to 1), but this didn't solve the problem. A additional problem is that the tunnel won't form after a restart when IKE fragmentation is enabled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anybody got any tips to solve these problems? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 11:38:58 GMT</pubDate>
    <dc:creator>j.goertzen</dc:creator>
    <dc:date>2020-02-21T11:38:58Z</dc:date>
    <item>
      <title>Cisco Router - ISA 2004 VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/cisco-router-isa-2004-vpn-connection/m-p/1269471#M949549</link>
      <description>&lt;P&gt;Hello there, I've recently connected a Cisco 871 router to a ISA 2004 server (site to site VPN). The connection details are listed in this Microsoft article: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://technet.microsoft.com/en-us/libr" target="_blank"&gt;http://technet.microsoft.com/en-us/libr&lt;/A&gt; ... 02442.aspx &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnel works, but it tends to disconnect once every week. Additionally we can't write backups to a server at the remote end (we only get a 1 kb file, the rest doesn't get transfered). The same goes for files that are sent by a scanner to the server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A article detailed that mismatched MTU values might be the cause of this. I've adapted the ISA to negotiate the MTU (by setting the EnablePMTUDiscovery to 1), but this didn't solve the problem. A additional problem is that the tunnel won't form after a restart when IKE fragmentation is enabled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anybody got any tips to solve these problems? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-router-isa-2004-vpn-connection/m-p/1269471#M949549</guid>
      <dc:creator>j.goertzen</dc:creator>
      <dc:date>2020-02-21T11:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Router - ISA 2004 VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/cisco-router-isa-2004-vpn-connection/m-p/1269472#M949551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco VPN Client users might receive this error when they attempt the connection with the head end VPN device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Attempted to assign network or broadcast IP address, removing (x.x.x.x) from pool" or "VPN client drops connection frequently on first attempt" or "Security VPN Connection terminated by tier. Reason 433."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution &lt;/P&gt;&lt;P&gt;The problem might be with the IP pool assignment either through ASA/PIX or Radius server. Use the debug crypto command in order to verify that the netmask and IP addresses are correct. Also, verify that the pool does not include the network address and the broadcast address. Radius servers must be able to assign the proper IP addresses to the clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Sep 2009 13:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-router-isa-2004-vpn-connection/m-p/1269472#M949551</guid>
      <dc:creator>s.jankowski</dc:creator>
      <dc:date>2009-09-01T13:19:18Z</dc:date>
    </item>
  </channel>
</rss>

