Using the newest version of Cisco VPN Client 5.0.07.0410
We have a remote office that VPNs in to connect to the main network to access internal resources.
On 7.2 they worked perfectly fine, once we did the upgrade to 8.4 they can still connect, but if you look at their session in the monitoring window of the ASDM they are passing 0 bytes of traffic sent and received and cannot access any of the internal resources.
This computer is connected directly to a DSL modem and going out to the internet, it isn't behind any funky routers or firewalls or anything. I've tried different VPN accounts from this office (like mine for example) and it does the same thing. It seems the issue is site related not account related
When I connect the VPN client at the site and look at the statistics for the connection I see the following or something like it
The Bypassed Packets just tick up and up and up continually as well as sent bytes but thats it.
What the heck is going on here?
Oh and I tried the account that this site uses from my house and it worked fine from there.
I have 30+ other VPN users with various client versions and Ipads and they ALL work fine with NO problems at all.
Is it possible that this has something to do with the ISP that this site uses or do I need to configure something different in their DSL modem?
The purpose of this document is to demonstrate how ISE authenticate / authorize a user that uses a smart card (PIN + Certificate) and password mechanism to login their system. This document describes the components used for this setup, configuration of IS...
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...