06-09-2008 03:38 PM - edited 02-21-2020 03:46 PM
I have several users that can connect to our VPN ussing IPSec on a 5505. I have one user that can connect, but cannot see the internal network. This user is using DSL with a speedstream 4100. However, I have another user with the same setup that can connect and see the internal network. The logs in ASDM show the connection, but don't seem to show any errors when trying to access internal. Any help will be greatly appreciated. Thanks, Bill.
Solved! Go to Solution.
06-10-2008 08:41 AM
06-10-2008 11:52 AM
No it does not. It just negotiates to see if there is any NAT in the transit path (by using HASH values), if the hashes are not equal it encapsulates the IPSEC traffic inside UDP 4500. The VPN is still as secure as it is before.
Regards
Farrukh
06-09-2008 05:59 PM
Are you using split tunneling/local lan access?
Are both Clients seeing the same routes in their VPN Client >> Routes window?
Have you tried to compare the 'route print' output of both machines after the VPN has been established?
Are both machines using Same OS/PATCH level?
Regards
Farrukh
06-09-2008 06:19 PM
using split tunneling. can't get local lan access to work on client side even if checked on the transport tab.
it only shows 0.0.0.0 0.0.0.0 for network/subnet under secured routes.
i will check the route print stats.
same os and patch levels.
Thanks,
bill
06-09-2008 06:38 PM
Please have a look at the following two links, please note you can use only ONE of them at a time:
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702992.shtml
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702999.shtml
Your output should match the VPN CLient >> Statistics >> Route details mentioned on these links, based on what you want to configure (Local LAN OR Split-tunneling)
Regards
Farrukh
06-10-2008 08:08 AM
06-10-2008 08:41 AM
Add..
crypto isakmp nat-traversal
06-10-2008 09:19 AM
crypto isakmp nat-traversal worked for one user, and i am going to try the other.
but does this pose any security risks?
06-10-2008 11:52 AM
No it does not. It just negotiates to see if there is any NAT in the transit path (by using HASH values), if the hashes are not equal it encapsulates the IPSEC traffic inside UDP 4500. The VPN is still as secure as it is before.
Regards
Farrukh
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide