cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1356
Views
0
Helpful
0
Comments
TCC_2
Level 10
Level 10

Core issue

This occurs in an existing LAN-to-LAN connection between a router and a remote IPSec peer, where the IPSec peer address is the crypto map interface. The crypto map interface is also defined for Port Address Translation (PAT). If a VPN Client  connection is made through the crypto map interface to the same remote IPSec peer, then the existing LAN-to-LAN connection is broken because all User Datagram Protocol (UDP) 500 packets are now translated to the new PAT translation. This is a re-occurrance of Cisco bug ID CSCeb31945.

Resolution

This issue is also documented in Cisco bug ID CSCsc80859.

For a workaround, change the IPSec peer source IP address to be a loopback interface. Issue the crypto map xxxx local-address loopback 0 command.

Change the remote IPSec peer address for either the LAN-to-LAN or remote access connection.

Define a static port mapping of UDP 500 to UDP 501 for the VPN Client connection.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: