cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
505
Views
5
Helpful
4
Replies

VPN Client Connected fine i can ping host but when i try to reach port 80 on browser nothing happens.

AlbGenius
Level 1
Level 1

Hi all,

 

I got an 2900 series Router. I have configured ok the Client i get connected and i actually can ping the host i need 172.17.5.14 but when i try to reach it via browser port 80 i cannot open the page. I can even set RDP connection with the server.

 

Any idea 

 

4 Replies 4

Hello,

 

are you using NAT ? Post the running configuration of your 2900 router...

crypto isakmp policy 97
encr aes
authentication pre-share
group 2
!
crypto isakmp policy 98
encr aes 256
authentication pre-share
group 2
!
crypto isakmp policy 99
encr aes 256
authentication pre-share
group 2
!
crypto isakmp policy 100
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp policy 101
encr aes
authentication pre-share
group 2

!
crypto isakmp client configuration group KVPN
key *****
dns 8.8.8.8
domain pg.local
pool vpnpool
acl VPNACL
include-local-lan
max-logins 10
netmask 255.255.255.0
!
crypto isakmp peer address *******
set aggressive-mode password *******
set aggressive-mode client-endpoint ipv4-address *********
crypto isakmp profile ITS
match identity group KVPN
client authentication list vpnclient
isakmp authorization list KVPN
client configuration address respond
crypto isakmp profile Site-SRV
keyring Site-auth
match identity address ********** 255.255.255.255
!
!
crypto ipsec transform-set ipsec-transform esp-3des esp-sha-hmac
crypto ipsec transform-set UKT-SRV50 esp-aes esp-sha-hmac
crypto ipsec transform-set UKT-SRV50-MD5 esp-3des esp-md5-hmac
!
!
!
crypto dynamic-map KVPN 100
set transform-set ipsec-transform
reverse-route
!
crypto dynamic-map dynmap 1000
set isakmp-profile ITS
!
!
crypto map VPNMAP client authentication list XAuthVPN
crypto map VPNMAP isakmp authorization list VPNAuth
crypto map VPNMAP client configuration address respond
crypto map VPNMAP 35 ipsec-isakmp
set peer **********
set security-association lifetime seconds 28800
set transform-set UKT-SRV50-MD5
set pfs group2
match address UKT-SRV50
crypto map VPNMAP 100 ipsec-isakmp dynamic KVPN discover
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
no ip route-cache
duplex auto
speed auto
!
interface GigabitEthernet0/0.5
description Servers
encapsulation dot1Q 5
ip address 172.17.5.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
ip nat inside
ip virtual-reassembly in
no ip route-cache
!
interface GigabitEthernet0/0.6
description Users
encapsulation dot1Q 6
ip address 172.17.6.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
no ip route-cache
!
interface GigabitEthernet0/0.10
description Mikrotik_Outside
encapsulation dot1Q 10
ip address 10.10.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
no ip route-cache
no cdp enable
!
interface GigabitEthernet0/1
ip address ********** 255.255.255.248
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
crypto map VPNMAP
!
interface GigabitEthernet0/2
description $ES_LAN$
no ip address
shutdown
duplex auto
speed auto
!
ip local pool REMOTEVPN 192.168.40.5 192.168.40.100
ip local pool vpnpool 192.168.33.1 192.168.33.10
ip forward-protocol nd
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip flow-top-talkers
top 10
sort-by bytes
!
ip nat inside source route-map nonat interface GigabitEthernet0/1 overload
ip nat inside source static tcp 172.17.5.14 8001 ********* 8001 extendable
ip nat inside source static tcp 172.17.5.14 80 ********* 30000 extendable
ip nat inside source static tcp 172.17.5.13 80 ********* 80 extendable
ip nat inside source static tcp 172.17.5.13 3389 ********* 3389 extendable
ip nat inside source static tcp 172.17.5.13 28596 ********** 28596 extendable
ip route 0.0.0.0 0.0.0.0 ***********
ip route 10.10.10.0 255.255.255.0 172.17.5.60
ip route 10.10.11.0 255.255.255.0 172.17.5.60
!
ip access-list extended UKT-SRV50
permit ip 172.17.5.0 0.0.0.255 host 192.168.50.5
permit ip 172.17.5.0 0.0.0.255 host 192.168.50.10
ip access-list extended VPNACL
permit ip 172.17.6.0 0.0.0.255 192.168.33.0 0.0.0.255
permit ip 172.17.5.0 0.0.0.255 192.168.33.0 0.0.0.255
!
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 100 deny ip 172.17.5.0 0.0.0.255 172.17.6.0 0.0.0.255
access-list 100 deny ip 172.17.6.0 0.0.0.255 172.17.5.0 0.0.0.255
access-list 100 deny ip 172.17.5.0 0.0.0.255 192.168.33.0 0.0.0.255
access-list 100 deny ip 172.17.5.0 0.0.0.255 host 192.168.50.5
access-list 100 deny ip 172.17.5.0 0.0.0.255 host 192.168.50.10
access-list 100 permit ip 172.17.6.0 0.0.0.255 any
access-list 100 permit ip 172.17.5.0 0.0.0.255 any
access-list 100 deny ip any any
!
route-map nonat permit 10
match ip address 100
!
!
!
!
!
control-plane
!
!

Hello,

 

the config looks ok as far as I can tell. The problem could be with MTU, try and ping the webserver with different MTU sizes:

 

ping -l 1472 -f 172.17.5.14

 

Increase the packet size until you get the message 'Packet needs to be fragmented but DF set'.

 

Is the webserver unreachable both with IP and DNS ?

Hi,

 

Webserver is IP only.

 

Everything above 1272 size, I get the message 'Packet needs to be fragmented but DF set'.

 

So should i increase MTU size?

 

Thnx

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card