10-10-2007 02:33 PM - edited 02-21-2020 01:43 AM
I am pretty desperate for ideas at this point; I've spent almost a week on this and the VPN is still down.
The story unfolds: we just moved all network equipment from a shelving unit to a rack. Some cables may not have been plugged back into their original ports, but I?m about 99% certain all are plugged into the same devices.
There was an operational PPTP VPN setup, which does not work since the ?move?. The use was, windows VPN client connecting to Cisco 506e, which used Radius to authenticate them and then allowed them access to all resources on the LAN. The configuration (a backup from when it was working) is attached.
So, it stops working after the move; users can still connect, however they can?t see any network resources, is this an NAT issue?
I?ve tried to create a new VPN using the Cisco client and the Cisco PIX wizard, but have a similar problem after connecting; no access to system resources, any suggestions as to what could have happened?
Solved! Go to Solution.
10-11-2007 09:51 AM
Let's say your new pool is 192.168.5.0/24. You will need to update the following line to reflect the change.
access-list inside_outbound_nat0_acl permit ip 192.168.2.0 255.255.255.0 192.168.5.0 255.255.255.0
nat (inside) 0 access-list inside_outbound_nat0_acl
Also, if you want access to 192.168.1.0 or 192.168.3.0 you would also add...
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0
10-10-2007 03:00 PM
hardware wise; I'll lay out the network.
wall --> Modem (dsl) --> in Cisco (Eth 0) | out Cisco (Eth 1) --> Dlink Gigabit switch (switch connected to two other switches, all LAN devices connected to these, or smaller switched connected to these switches)
10-11-2007 05:37 AM
What did your config look like when you tried setting up an ipsec vpn with the cisco client? Make sure you had "isakmp nat-traversal". One other thing I noticed is that the vpn pool should not be in the same subnet as any other inside subnet. You should make the pool outside the range of 192.168.2.0, 192.168.1.0, 192.168.3.0 etc. This doesn't necessarily explain why your pptp vpn stopped working but it will give you something to go on.
10-11-2007 09:26 AM
thanks for the response acomiskey,
Ok, changing the VPN pool range seems to make sense. I moved if to a 'block' of assigned IPs and figured that would be enough. Will moving it off the 192.168.1.0-2.0-3.0 require any other commands to allow it access to the LAN objects, server, desktops, etc?
I'll also check for the isakmp nat-traversal once I go though the Cisco wizard (for Cisco clients).
Thanks again for the feedback,
~Noah
10-11-2007 09:51 AM
Let's say your new pool is 192.168.5.0/24. You will need to update the following line to reflect the change.
access-list inside_outbound_nat0_acl permit ip 192.168.2.0 255.255.255.0 192.168.5.0 255.255.255.0
nat (inside) 0 access-list inside_outbound_nat0_acl
Also, if you want access to 192.168.1.0 or 192.168.3.0 you would also add...
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0
10-11-2007 09:52 AM
i figured it would require something along those line, thanks again for the help, and the quick response!
~noah
10-15-2007 09:43 AM
Thank you very much Acomiskey, solved the problems I was having. I hope you have a great week. Thanks again.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide