03-28-2011 08:59 PM
I've the following scenario VPN Concentrator is connected to a router which is connected to a router and at the edge Cisco 515E PIX is connected to the internet. The problem is that the normal VPN Dial-up connection (a utility of windows) are getting connected but Cisco VPN Client throws error 412. Here's what I've tried (Initially groups and user were created): (1) Allowed port 10000 on PIX ( access-list from-outside-coming-in permit tcp any host <public ip> eq 10000) and checked IPSec over UDP on VPN Conc. under Mode Config tab. Also checked IPSec over TCP tab under tunneling panel at port 10000. Tried connecting through VPN Client but it threw error 412 (2) In the reference guide, I read that IPSec over NAT is allowed on ports ranging from 4000 something to 40000 something. I tried 33333, both on PIX and VPN Conc. under Mode Config tab but still no use. Same error 412. Please, guide me as maybe I'm missing something. Urgent help will highly be appreciated!
03-28-2011 09:22 PM
NAT-T uses UDP/4500, so you might want to open that port as well.
Is your PIX firewall performing NAT for the VPN Concentrator public interface IP? How is the PIX configured?
You mention that your VPN Client is getting connected however then throw error 412. Can you please advise if it's connected on both Phase 1 (IKE) and Phase 2 (IPSec)? Can you share the logs from the vpn client as well as from the vpn concentrator to see exactly where it's failing?
03-29-2011 01:51 AM
Here's the detailed overview of the scenario:
static (inside,outside)
route inside
access-list from-outside-coming-in permit tcp any host
access-list from-outside-coming-in permit tcp any host
access-list from-outside-coming-in deny ip any any
access-list from-outside-coming-in deny icmp any any
there's no connection, still. No logs are generated by VPN Client as there was no connection established. No key exchanged
Maybe I was in a rush that's why I couldn't explain well but still your response is well and truly regarded. I need urgent help from the community
03-29-2011 03:22 AM
PPTP and IPSec are 2 different types of VPN.
Are you using PPTP client or IPSec client? If you are using the Cisco VPN Client software, then it's IPSec VPN, not PPTP VPN.
From the PIX, I don't see that you are allowing both TCP and UDP as the access-list only specify TCP. Also if you are using IPSec VPN, don't worry about the PPTP access-list.
You would need to configure the following:
access-list from-outside-coming-in permit udp any host
access-list from-outside-coming-in permit udp any host
access-list from-outside-coming-in permit udp any host
Also, please make sure that the above permit lines are configured above the current "access-list from-outside-coming-in deny ip any any" line.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide