cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1808
Views
0
Helpful
5
Replies

Cisco VPN Client (4.0.5) blocks inbound UDP traffic (and some TCP as well)

sara.janos
Level 1
Level 1

Hi,

I'm not much into networking so it may sound as a newbie question:

I use some file-sharing software which uses UDP communication.

When my Cisco VPN Client is connected (to the company I work for) lines like this can be found in its logfile:

7455 20:42:45.203 01/16/06 Sev=Info/4 FIREWALL/0x63A00003

BLOCK: UDP 220.245.108.70:6881 to 80.99.93.100:52345

80.99.93.100 is me.

No kind of firewall was on during this log.

I have no router whatsoever at home.

This test: https://www.grc.com/x/portprobe=52345 cannot reach my 52345 port when VPN is connected, it can when it's not connected.

Stateful firewall is off.

In connection properties 'Enable transparent tunneling' is checked with the 'IPSec over UDP (NAT/PAT)' chosen.

Any idea to let this inbound UDP traffic through?

And to much of my surprise there are some lines like this in the log, blocking some inbound TCP:

7374 20:42:34.375 01/16/06 Sev=Info/4 FIREWALL/0x63A00003

BLOCK: TCP 193.225.232.137:2793 to 80.99.93.100:52345

Can anyone tell me why is that?

Thanks a lot in advance

Janos

5 Replies 5

vkapoor5
Level 5
Level 5

What is the VPN Gateway at your company end? Some VPN gateways (Fro example, Cisco VPN Concentrators) can be configured to push firewall functions to the VPN client at the time of tunnel negociation. See the following link for more information:

http://www.cisco.com/univercd/cc/td/doc/product/vpn/client/4_6/ugwin/vc5.htm#wp1010052

Thanks for help.

It seems that's actually the reason for why UDP-in gets blocked, see my other post.

rene.schmid
Level 1
Level 1

hi,

i'm sure, that your company encrypt all traffic via the vpn tunnel. you can check this, by connecting to your vpn gateway then right click on the vpn client icon -> choose statistics and take a look at the route details. if there is the net 0.0.0.0 0.0.0.0 on the secured routes side then your company routes every traffic via the vpn tunnel.

hope that helps..

rene

Hi Rene,

Thanks for your reply.

In my case, at the place you mentioned all subnet masks start with 255.

Another thing is that I didn't really get your point why the fact whether vpn tunnel traffic is encrypted or not would affect incoming UDP packets from the rest of the internet. Maybe it's just my limited networking knowledge.

Anyway in the meantime I found the answer to my own question, see other post of mine.

sara.janos
Level 1
Level 1

I found the answer in the meantime, and what 'vkapoor5' posted completes the picture:

My Cisco VPN Client has a built in ZoneAlarm firewall which blocks all incoming UDP according to the settings that are enforced by the gateway I'm connected to which has a Cisco VPN Concentrator.

If I, with some dll+registry hacking (http://www.outpostfirewall.com/forum/showthread.php?t=9917), disable that I cannot connect to my gateway because it complains about mismatching firewall settings.

ZoneAlarm FREE blocks all incoming UDP, no matter what.

ZoneAlarm Pro can be configured to let that through, but still, when connecting to the gateway enforcement of firewall setting takes place and my personal setting are overruled.

All in all, to see the bright side of it, my company to some good extent passed the exam :-)