<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Troubleshooting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745665#M983786</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI  ..  here is a working config you could use as reference ..  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication LOCAL&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 100 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 100 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 100 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 100 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 100 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP address-pool VPNGROUP-Pool&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP dns-server x.x.x.x&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP default-domain domain.net&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username remoteuser password remoteuser privilege 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Jul 2007 06:10:16 GMT</pubDate>
    <dc:creator>Fernando_Meza</dc:creator>
    <dc:date>2007-07-25T06:10:16Z</dc:date>
    <item>
      <title>VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745663#M983784</link>
      <description>&lt;P&gt;Argghh - I'm pulling my hair out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having problems with this VPN stuff. I have read piles of books etc and I just can't see what the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PIX515E which has a outside interface with a private IP address which connects to the inside of a 3660 Router. The router nat the PIX ip to a internet routable IP. No access-list are on the router and traffic flows thorugh to other internal IPs fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN Cisco Client is saying:&lt;/P&gt;&lt;P&gt;Cisco Systems VPN Client Version 5.0.00.0340&lt;/P&gt;&lt;P&gt;Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.&lt;/P&gt;&lt;P&gt;Client Type(s): Windows, WinNT&lt;/P&gt;&lt;P&gt;Running on: 5.1.2600 Service Pack 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;259    16:36:02.050  07/24/07  Sev=Info/4	CM/0x63100024&lt;/P&gt;&lt;P&gt;Attempt connection with server "*.*.*.*"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;260    16:36:02.060  07/24/07  Sev=Info/6	IKE/0x6300003B&lt;/P&gt;&lt;P&gt;Attempting to establish a connection with *.*.*.*.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;261    16:36:02.090  07/24/07  Sev=Info/4	IKE/0x63000013&lt;/P&gt;&lt;P&gt;SENDING &amp;gt;&amp;gt;&amp;gt; ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Unity)) to *.*.*.*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;262    16:36:02.100  07/24/07  Sev=Info/4	IPSEC/0x63700008&lt;/P&gt;&lt;P&gt;IPSec driver successfully started&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;263    16:36:02.100  07/24/07  Sev=Info/4	IPSEC/0x63700014&lt;/P&gt;&lt;P&gt;Deleted all keys&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;264    16:36:07.568  07/24/07  Sev=Info/4	IKE/0x63000021&lt;/P&gt;&lt;P&gt;Retransmitting last packet!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;265    16:36:07.568  07/24/07  Sev=Info/4	IKE/0x63000013&lt;/P&gt;&lt;P&gt;SENDING &amp;gt;&amp;gt;&amp;gt; ISAKMP OAK AG (Retransmission) to *.*.*.*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;270    16:36:22.589  07/24/07  Sev=Info/4	IKE/0x63000017&lt;/P&gt;&lt;P&gt;Marking IKE SA for deletion  (I_Cookie=B9A3A69D5B3192A7 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;271    16:36:23.090  07/24/07  Sev=Info/4	IKE/0x6300004B&lt;/P&gt;&lt;P&gt;Discarding IKE SA negotiation (I_Cookie=B9A3A69D5B3192A7 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;272    16:36:23.090  07/24/07  Sev=Info/4	CM/0x63100014&lt;/P&gt;&lt;P&gt;Unable to establish Phase 1 SA with server "*.*.*.*" because of "DEL_REASON_PEER_NOT_RESPONDING"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX 515 has increase in the In Octets and also packets but has the same amount of dropped packets in a Show ISAKMP command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global IKE Statistics&lt;/P&gt;&lt;P&gt;Active Tunnels: 0&lt;/P&gt;&lt;P&gt;Previous Tunnels: 0&lt;/P&gt;&lt;P&gt;In Octets: 46152&lt;/P&gt;&lt;P&gt;In Packets: 56&lt;/P&gt;&lt;P&gt;In Drop Packets: 56&lt;/P&gt;&lt;P&gt;In Notifys: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISAKMP is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set Myset esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map TestMap 1 match address CorpOffice&lt;/P&gt;&lt;P&gt;crypto dynamic-map TestMap 1 set transform-set Myset&lt;/P&gt;&lt;P&gt;crypto map Test 10 ipsec-isakmp dynamic TestMap&lt;/P&gt;&lt;P&gt;crypto map Test interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity hostname&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal  20&lt;/P&gt;&lt;P&gt;crypto isakmp am-disable&lt;/P&gt;&lt;P&gt;crypto isakmp disconnect-notify&lt;/P&gt;&lt;P&gt;crypto isakmp reload-wait&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any pointers on how to debug or even fix - much much much appreciated!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745663#M983784</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2019-03-26T00:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745664#M983785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ed,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like you use IP address to connect, so you shold use "crypto isakmp identity address" instead of "crypto isakmp identity hostname".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you don't really need the match statement in the dynamic crypto map so you can try to remove it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this does not help it would be useful to see the debugging from the PIX.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2007 21:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745664#M983785</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-24T21:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745665#M983786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI  ..  here is a working config you could use as reference ..  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication LOCAL&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 100 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 100 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 100 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 100 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 100 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP address-pool VPNGROUP-Pool&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP dns-server x.x.x.x&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP default-domain domain.net&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup VPNGROUP password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username remoteuser password remoteuser privilege 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 06:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745665#M983786</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-07-25T06:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745666#M983787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got a bit futher after posting my message. The problem was the crypto isakmp match address command!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So after a few bumps I can connect no errors that I can see etc. However now I pass any traffic -  debug only referances this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Built ICMP connection for faddr 10.10.10.18/1024 gaddr 10.9.9.10/0 laddr 10.9.9.10/0&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;Teardown ICMP connection for faddr 10.10.10.18/1024 gaddr 10.9.9.10/0 laddr 10.9.9.10/0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas why I seem to be sending but not getting a response back ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 09:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745666#M983787</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-07-25T09:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745667#M983788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I honestly can't see why this isnt working ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISAKMP is as follows: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set Myset esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map TestMap 1 set transform-set Myset &lt;/P&gt;&lt;P&gt;crypto map Test 10 ipsec-isakmp dynamic TestMap &lt;/P&gt;&lt;P&gt;crypto map Test interface outside &lt;/P&gt;&lt;P&gt;crypto isakmp identity address&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside &lt;/P&gt;&lt;P&gt;crypto isakmp policy 5 &lt;/P&gt;&lt;P&gt;authentication pre-share &lt;/P&gt;&lt;P&gt;encryption des &lt;/P&gt;&lt;P&gt;hash md5 &lt;/P&gt;&lt;P&gt;group 2 &lt;/P&gt;&lt;P&gt;lifetime 86400 &lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 20 &lt;/P&gt;&lt;P&gt;crypto isakmp am-disable &lt;/P&gt;&lt;P&gt;crypto isakmp disconnect-notify &lt;/P&gt;&lt;P&gt;crypto isakmp reload-wait &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have nat 0 (inside) access-list Test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Test extended permit ip any 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there other command I should be seeing ?? I have entered sysopt connection permit-vpn (thou it doesnt show up in config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any desperate help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 15:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745667#M983788</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-07-25T15:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745668#M983789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 POINTS FOR THE FIRST CORRECT ANSWER!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can connect and auth with no erros but not pass traffic. I get this in the debug when I try to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Built ICMP connection for faddr 10.10.10.18/1024 gaddr 10.9.9.10/0 laddr 10.9.9.10/0 &lt;/P&gt;&lt;P&gt;. &lt;/P&gt;&lt;P&gt;. &lt;/P&gt;&lt;P&gt;. &lt;/P&gt;&lt;P&gt;Teardown ICMP connection for faddr 10.10.10.18/1024 gaddr 10.9.9.10/0 laddr 10.9.9.10/0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config without correct IP's is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname VPN-Headache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.11.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list Out extended permit tcp host 10.10.1.201 any eq ftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list In extended permit udp host 10.11.1.2 host 10.250.250.201 eq tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list VPNTest extended permit ip any 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool Off-Pool 192.168.1.50-192.168.20.1.60&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 2 10.250.250.10&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list VPNTest&lt;/P&gt;&lt;P&gt;nat (inside) 2 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.250.250.201 10.10.1.201 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group In in interface outside&lt;/P&gt;&lt;P&gt;access-group Out in interface inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.11.1.2 1&lt;/P&gt;&lt;P&gt;route inside 10.10.1.0 255.255.255.0 10.10.10.2 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; banner value Testing Default&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server none&lt;/P&gt;&lt;P&gt; dhcp-network-scope none&lt;/P&gt;&lt;P&gt; vpn-access-hours none&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-session-timeout none&lt;/P&gt;&lt;P&gt; vpn-filter none&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt; ip-comp disable&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; group-lock none&lt;/P&gt;&lt;P&gt; pfs disable&lt;/P&gt;&lt;P&gt; ipsec-udp disable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list none&lt;/P&gt;&lt;P&gt; default-domain none&lt;/P&gt;&lt;P&gt; split-dns none&lt;/P&gt;&lt;P&gt; intercept-dhcp 255.255.255.255 disable&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout 30&lt;/P&gt;&lt;P&gt; ip-phone-bypass disable&lt;/P&gt;&lt;P&gt; leap-bypass disable&lt;/P&gt;&lt;P&gt; nem disable&lt;/P&gt;&lt;P&gt; backup-servers keep-client-config&lt;/P&gt;&lt;P&gt; msie-proxy server none&lt;/P&gt;&lt;P&gt; msie-proxy method no-modify&lt;/P&gt;&lt;P&gt; msie-proxy except-list none&lt;/P&gt;&lt;P&gt; msie-proxy local-bypass disable&lt;/P&gt;&lt;P&gt; nac disable&lt;/P&gt;&lt;P&gt; nac-sq-period 300&lt;/P&gt;&lt;P&gt; nac-reval-period 36000&lt;/P&gt;&lt;P&gt; nac-default-acl none&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt; client-firewall none&lt;/P&gt;&lt;P&gt; client-access-rule none&lt;/P&gt;&lt;P&gt;group-policy Test internal&lt;/P&gt;&lt;P&gt;group-policy Test attributes&lt;/P&gt;&lt;P&gt; banner value Test Test&lt;/P&gt;&lt;P&gt; wins-server value 10.10.1.2 10.10.1.5&lt;/P&gt;&lt;P&gt; vpn-session-timeout 30&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set Myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map Test1 1 set transform-set Myset&lt;/P&gt;&lt;P&gt;crypto map VPN 10 ipsec-isakmp dynamic Test1&lt;/P&gt;&lt;P&gt;crypto map VPN interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal  20&lt;/P&gt;&lt;P&gt;crypto isakmp disconnect-notify&lt;/P&gt;&lt;P&gt;crypto isakmp reload-wait&lt;/P&gt;&lt;P&gt;tunnel-group Off type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group Off general-attributes&lt;/P&gt;&lt;P&gt; address-pool Off-Pool&lt;/P&gt;&lt;P&gt; authentication-server-group (outside) Mygroup&lt;/P&gt;&lt;P&gt; accounting-server-group Mygroup&lt;/P&gt;&lt;P&gt; default-group-policy Test&lt;/P&gt;&lt;P&gt;tunnel-group Off ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 16:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745668#M983789</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-07-25T16:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745669#M983790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ed,&lt;/P&gt;&lt;P&gt;Does the rest of your network know a route back to the network you are using for the VPN?  Assuming that you have an 'Inside' interface connected to your network, other networking devices in your network would need to know that IP address in order to send traffic back to the  network subnet you are assigning to the VPN clients.&lt;/P&gt;&lt;P&gt;Carl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 16:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745669#M983790</guid>
      <dc:creator>1cmerchant</dc:creator>
      <dc:date>2007-07-25T16:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745670#M983791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I have a route on my internal router pointing 192.168.1.0 255.255.255.0 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The gateway my clients get given is 192.0.0.1 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure why ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 16:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745670#M983791</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-07-25T16:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745671#M983792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked this last night - and thought it was correct but after your post, I checked again. Guess what - it was pointing to the old firewall. lol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't believe it! Thanks for the heads up - 5 points as promised!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 16:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-troubleshooting/m-p/745671#M983792</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-07-25T16:56:26Z</dc:date>
    </item>
  </channel>
</rss>

